Monero Transaction 638909552c20128104e22cc7c1f73f0bc5c0e00d15ff4a5c252a994d3c63e785

Autorefresh is OFF

Tx hash: 638909552c20128104e22cc7c1f73f0bc5c0e00d15ff4a5c252a994d3c63e785

Tx prefix hash: ef6e894540a14d314651fd610aaa01d70d136a92ddb239d6bfa94239e6891475
Tx public key: fdf5b39cd7d2c7702ff58240f852c2757b5ab908d7f3937a708d85bf2565f433
Payment id: 4cb0dd39f08547606de0055a5700519fd63d0607f78d489bd4ee97e949c771f6

Transaction 638909552c20128104e22cc7c1f73f0bc5c0e00d15ff4a5c252a994d3c63e785 was carried out on the Monero network on 2014-09-12 22:24:02. The transaction has 3091240 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1410560642 Timestamp [UTC]: 2014-09-12 22:24:02 Age [y:d:h:m:s]: 10:100:15:41:26
Block: 215190 Fee (per_kB): 0.100000000000 (0.283656509695) Tx size: 0.3525 kB
Tx version: 1 No of confirmations: 3091240 RingCT/type: no
Extra: 0221004cb0dd39f08547606de0055a5700519fd63d0607f78d489bd4ee97e949c771f601fdf5b39cd7d2c7702ff58240f852c2757b5ab908d7f3937a708d85bf2565f433

2 output(s) for total of 0.800020000000 xmr

stealth address amount amount idx tag
00: f298391252a634bff6298274f85508bcfcadab75481d167ea475df83d07546db 0.000020000000 35737 of 59482 -
01: 87ba5279345268d321995a19c8ac8c181f2efd63a4de7c02d7a0791e468d4dec 0.800000000000 153535 of 489955 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-09-12 19:49:06 till 2014-09-12 22:01:11; resolution: 0.00 days)

  • |_____________________________________________________________________________________________*____________________________________________________________________________|
  • |_____________________________________________________________________________*____________________________________________________________________________________________|

2 inputs(s) for total of 0.900020000000 xmr

key image 00: b9010396a831079ef1bca4ca592c28a2bf7fb5e2f77e8248e45aa1e882100aab amount: 0.000020000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 96b5a85cafdba14e52d4e96e30503fd0681d6a8d41b06b9d6dbf5643b9dcfe4f 00215132 1 2/2 2014-09-12 21:01:11 10:100:17:04:17
key image 01: 5db4658b0e279f443c23aa0fdacdfef4894881337c449646d4cd4b3ac5d6945a amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 75a3b740774fd3ffa87b8e583805a87ae73c5c64234bbfee2af66c708d74ceaf 00215124 1 2/3 2014-09-12 20:49:06 10:100:17:16:22
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 20000000, "key_offsets": [ 35736 ], "k_image": "b9010396a831079ef1bca4ca592c28a2bf7fb5e2f77e8248e45aa1e882100aab" } }, { "key": { "amount": 900000000000, "key_offsets": [ 119419 ], "k_image": "5db4658b0e279f443c23aa0fdacdfef4894881337c449646d4cd4b3ac5d6945a" } } ], "vout": [ { "amount": 20000000, "target": { "key": "f298391252a634bff6298274f85508bcfcadab75481d167ea475df83d07546db" } }, { "amount": 800000000000, "target": { "key": "87ba5279345268d321995a19c8ac8c181f2efd63a4de7c02d7a0791e468d4dec" } } ], "extra": [ 2, 33, 0, 76, 176, 221, 57, 240, 133, 71, 96, 109, 224, 5, 90, 87, 0, 81, 159, 214, 61, 6, 7, 247, 141, 72, 155, 212, 238, 151, 233, 73, 199, 113, 246, 1, 253, 245, 179, 156, 215, 210, 199, 112, 47, 245, 130, 64, 248, 82, 194, 117, 123, 90, 185, 8, 215, 243, 147, 122, 112, 141, 133, 191, 37, 101, 244, 51 ], "signatures": [ "ba10431bf887acb7e4011cf6112c9a48d1492a61d01b95c0e6f627c4f7965709d8018cf127e6c5b5d7a4dd99cb1889766e41631f39ac8c3f9d60a8f58f8d4303", "9f38c425bdce461d871bb4f142252a611c211c437624fae4c312679792f7600583ee324a48e3dd00ced9fbaeb5a92ee63aa40f8b90905b3db3291564cbc06f03"] }


Less details
source code | moneroexplorer