Monero Transaction 4fdaff0cb4391d6c68aafcaec3856e0dc1f520a930c023c5bba86de03056762d

Autorefresh is OFF

Tx hash: 4fdaff0cb4391d6c68aafcaec3856e0dc1f520a930c023c5bba86de03056762d

Tx prefix hash: 6f6ce53aa6f9f9a3c1f188298351bb99e22e20f1526280a9368c13279be2a3e5
Tx public key: 146f610a9a40a4afc8688b2132106060871e0871f906ae09fa84439025372d18
Payment id: a59790e802aba8c6e02fdef2aeeee4cda39367eafa06b7477c807a519a738c09

Transaction 4fdaff0cb4391d6c68aafcaec3856e0dc1f520a930c023c5bba86de03056762d was carried out on the Monero network on 2014-07-25 04:23:06. The transaction has 3137226 confirmations. Total output fee is 0.005542810000 XMR.

Timestamp: 1406262186 Timestamp [UTC]: 2014-07-25 04:23:06 Age [y:d:h:m:s]: 10:115:01:19:08
Block: 143739 Fee (per_kB): 0.005542810000 (0.006044555314) Tx size: 0.9170 kB
Tx version: 1 No of confirmations: 3137226 RingCT/type: no
Extra: 022100a59790e802aba8c6e02fdef2aeeee4cda39367eafa06b7477c807a519a738c0901146f610a9a40a4afc8688b2132106060871e0871f906ae09fa84439025372d18

9 output(s) for total of 4.600457190000 xmr

stealth address amount amount idx tag
00: 41a2d46863ab8e0adcfff8c2bb59258c16f2ad5c09d5804cc638ff6906566e7d 0.000457190000 0 of 1 -
01: ea1a2e0edad82220627776c99a03366a3cad807023c91dbddc6480a51b28f43c 0.005000000000 194564 of 308585 -
02: d8610ac0b39e2e918016950e55f377927bbbfb277f0690fb104381d84c4509c1 0.005000000000 194565 of 308585 -
03: d58cebfbf732e19637316b650ebff026a9450a517d78269558d555f0a23536ec 0.020000000000 203231 of 381492 -
04: 02d26d14b614dd74ec2f988f4aa29ae35666d755aaab4b57edbee900aa4ef980 0.070000000000 86817 of 263947 -
05: 8c6fd60ff834366e16928ea2276a61e78f723dc74acf50dffc3fde6a3e47ef24 0.200000000000 254528 of 1272210 -
06: dcdf4dcd03ee0391826922f024c1e7fc1a780cd515132af1ecb02a9aec02a8c9 0.300000000000 119098 of 976536 -
07: 274df15af7aaaf71fbd84368bada9643878ed12615e5b5da7c6dd77a607d0b72 1.000000000000 132486 of 874629 -
08: e8f021f47395cbcde468702c821a965fcea112446f27ff347536214bae1ee1ee 3.000000000000 33860 of 300495 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-06 20:29:25 till 2014-07-25 04:59:45; resolution: 0.28 days)

  • |_____*___________________________________________________________________________________________________________________________________________________________________*|
  • |____*____________________________________________________________________________________________________________________________________________________________________*|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|

3 inputs(s) for total of 4.606000000000 xmr

key image 00: 3345ff13d0cb23c76679f7e3cb0bcdae2b3a1004a8c9cf1e60d2a424b888cb28 amount: 0.600000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 2f8ce93dba4ae8fb7c032456c7bd8888ca3eba122ac9877006288a83755c5422 00075520 1 28/97 2014-06-08 02:09:26 10:162:03:32:48
- 01: b1940ea548d8ac1a7559774c81208bd429c63ce4c775790262b3f1a15d6ceb77 00143667 2 3/7 2014-07-25 03:19:12 10:115:02:23:02
key image 01: 4c45b95ef227f8fc2594a674554302ed0c6a49eae099765bf272925e58bc30d3 amount: 0.006000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4db3acc6e390992980bef6249f32695bf3c2a96d7831c960479b2c39c9d6c212 00075079 1 2/95 2014-06-07 18:42:52 10:162:10:59:22
- 01: d0765c831346a5fbbc63314b8789cc431b1949156139068e1677b18e69455469 00143688 2 8/39 2014-07-25 03:39:06 10:115:02:03:08
key image 02: 7d8157cdfcdf4b1663b8eb89fe113fd514d1cf262bfd62a2e649bf51b4b7ebe3 amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8aa8c7eedd7f7fbe416479adb1403348063901005ac949419e91012d2bca6292 00073840 1 4/145 2014-06-06 21:29:25 10:163:08:12:49
- 01: 0261bff78b60889f1eb98b42369864bc61d38927b44a7748b98be7d49b7cdfe7 00143712 2 3/8 2014-07-25 03:59:45 10:115:01:42:29
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 600000000000, "key_offsets": [ 14133, 92797 ], "k_image": "3345ff13d0cb23c76679f7e3cb0bcdae2b3a1004a8c9cf1e60d2a424b888cb28" } }, { "key": { "amount": 6000000000, "key_offsets": [ 60547, 113261 ], "k_image": "4c45b95ef227f8fc2594a674554302ed0c6a49eae099765bf272925e58bc30d3" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 4771, 22696 ], "k_image": "7d8157cdfcdf4b1663b8eb89fe113fd514d1cf262bfd62a2e649bf51b4b7ebe3" } } ], "vout": [ { "amount": 457190000, "target": { "key": "41a2d46863ab8e0adcfff8c2bb59258c16f2ad5c09d5804cc638ff6906566e7d" } }, { "amount": 5000000000, "target": { "key": "ea1a2e0edad82220627776c99a03366a3cad807023c91dbddc6480a51b28f43c" } }, { "amount": 5000000000, "target": { "key": "d8610ac0b39e2e918016950e55f377927bbbfb277f0690fb104381d84c4509c1" } }, { "amount": 20000000000, "target": { "key": "d58cebfbf732e19637316b650ebff026a9450a517d78269558d555f0a23536ec" } }, { "amount": 70000000000, "target": { "key": "02d26d14b614dd74ec2f988f4aa29ae35666d755aaab4b57edbee900aa4ef980" } }, { "amount": 200000000000, "target": { "key": "8c6fd60ff834366e16928ea2276a61e78f723dc74acf50dffc3fde6a3e47ef24" } }, { "amount": 300000000000, "target": { "key": "dcdf4dcd03ee0391826922f024c1e7fc1a780cd515132af1ecb02a9aec02a8c9" } }, { "amount": 1000000000000, "target": { "key": "274df15af7aaaf71fbd84368bada9643878ed12615e5b5da7c6dd77a607d0b72" } }, { "amount": 3000000000000, "target": { "key": "e8f021f47395cbcde468702c821a965fcea112446f27ff347536214bae1ee1ee" } } ], "extra": [ 2, 33, 0, 165, 151, 144, 232, 2, 171, 168, 198, 224, 47, 222, 242, 174, 238, 228, 205, 163, 147, 103, 234, 250, 6, 183, 71, 124, 128, 122, 81, 154, 115, 140, 9, 1, 20, 111, 97, 10, 154, 64, 164, 175, 200, 104, 139, 33, 50, 16, 96, 96, 135, 30, 8, 113, 249, 6, 174, 9, 250, 132, 67, 144, 37, 55, 45, 24 ], "signatures": [ "b1775c237065ce08d23346f54e27d3abcae733e216d5af134f170913fdb7fe036c32d3f46f60c5cdfdba15506996965279dc4479c7eb10b280f0ce0777ee310a05c2d5653c2ec43305a1bb705c79552385007784c4acf57d7129c10c3f2647009b25dbc04b40712fdd97ad92e5f18dd66b39ad9cda3a46abbfd395c078e2aa0e", "e26426f72a707d1bba1fb0b7785cfe03c6a7740514af7ef66d844961ff0dde0ad1363eb38ada48b99586281ef1bc81659ec0ea683cd4dbc8ffd019cd774cc70aec73af017223d4570de1acd90572be106ad40a155accf104473c1b54bee3690575ebda1b178a1eb66960c903fefae158d567e91865f70a69efc631a7ca5d7a00", "7e9c5b0c87db88f7744927c002017daefe923c7a47ca6fa40abae40658a7c2072b9864326884998949586e20dd714389abcd2c1e88746c7b47508065f2f91702b0962196646b493a6a0ca1d2647814c8e636371d63e1430bbe039b156a5af90ef755dcb968c12a063a280413a21f61ce3a0f58559e4f1430635d66138b21b50f"] }


Less details
source code | moneroexplorer