Monero Transaction 71af428dc8cba7eedc9e85f9a5304a3581dcb5a8b65504ee880827d150498be8

Autorefresh is OFF

Tx hash: 71af428dc8cba7eedc9e85f9a5304a3581dcb5a8b65504ee880827d150498be8

Tx prefix hash: 41cefe71a5b1d31ac28b05d968f9db2800ea61e155d14a7b74272d2dceaf1654
Tx public key: 6cd143c9008f33b07228b66473a16c039facab294c771363b9ce650def0acd28

Transaction 71af428dc8cba7eedc9e85f9a5304a3581dcb5a8b65504ee880827d150498be8 was carried out on the Monero network on 2014-07-24 16:46:26. The transaction has 3098736 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1406220386 Timestamp [UTC]: 2014-07-24 16:46:26 Age [y:d:h:m:s]: 10:061:01:52:21
Block: 143060 Fee (per_kB): 0.010000000000 (0.022260869565) Tx size: 0.4492 kB
Tx version: 1 No of confirmations: 3098736 RingCT/type: no
Extra: 016cd143c9008f33b07228b66473a16c039facab294c771363b9ce650def0acd28

3 output(s) for total of 0.890000000000 xmr

stealth address amount amount idx tag
00: 0d48514d602a980ac6d9689b9a7c23726a79ae40b63ae3acea07d19163da9439 0.090000000000 88685 of 317822 -
01: 34d2f49e84283f058c6efdfee3d8296fec829fccf66325c5f8b44af63413ad99 0.100000000000 315625 of 982315 -
02: 5b8c7a9b970c26ecf2168f13b43ad0211eb1654d3568fd5753e6b214296d4b1b 0.700000000000 79572 of 514466 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-29 19:53:58 till 2014-07-24 17:17:52; resolution: 0.15 days)

  • |_*_________________________________________________________________________*___________*_________________________________________________________________________________*|

1 inputs(s) for total of 0.900000000000 xmr

key image 00: 98d502bcd1d99ff867ff89997d38d555d14a80b8e64c1e919ee83dd551b73176 amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f49f3ea869a7445ea418b56f0b456623776fa5f4ebcfcd4e67ff46272a04b20a 00107261 0 0/6 2014-06-29 20:53:58 10:085:21:44:49
- 01: 50bf75fbe916db4a36c89e7747433d3d428e9a1ced7bcaa1bc81631af40a7d45 00123020 1 7/55 2014-07-10 20:02:15 10:074:22:36:32
- 02: e2c08cdf3e54931baa5e55acaeb6b07bc35b22e9122777c312b64f8771cd7771 00125566 1 16/71 2014-07-12 14:33:50 10:073:04:04:57
- 03: e38538f5d0e40903d213daf594432a7eeec5da4fe195c571900d6b277b1c9f1e 00143034 4 2/4 2014-07-24 16:17:52 10:061:02:20:55
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 900000000000, "key_offsets": [ 37795, 12562, 1803, 12195 ], "k_image": "98d502bcd1d99ff867ff89997d38d555d14a80b8e64c1e919ee83dd551b73176" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "0d48514d602a980ac6d9689b9a7c23726a79ae40b63ae3acea07d19163da9439" } }, { "amount": 100000000000, "target": { "key": "34d2f49e84283f058c6efdfee3d8296fec829fccf66325c5f8b44af63413ad99" } }, { "amount": 700000000000, "target": { "key": "5b8c7a9b970c26ecf2168f13b43ad0211eb1654d3568fd5753e6b214296d4b1b" } } ], "extra": [ 1, 108, 209, 67, 201, 0, 143, 51, 176, 114, 40, 182, 100, 115, 161, 108, 3, 159, 172, 171, 41, 76, 119, 19, 99, 185, 206, 101, 13, 239, 10, 205, 40 ], "signatures": [ "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"] }


Less details
source code | moneroexplorer