Monero Transaction 94af6ae1d7b7dfce9d5f03810d33a205d4fb27e13a624c2303f8dd8f202b50f6

Autorefresh is OFF

Tx hash: 94af6ae1d7b7dfce9d5f03810d33a205d4fb27e13a624c2303f8dd8f202b50f6

Tx prefix hash: 6b01976b7f4cc98c774eabaecb4451d68c99369717285377ca9582071e4b572f
Tx public key: 742c2f27c98450f219e819a81e773062fd8d5c3832d6554611c5ba9fe85057a5
Payment id: 8008b42891e705768e2a5cb6b2369c6fe2677ce89d083385e859ff968db34bb6

Transaction 94af6ae1d7b7dfce9d5f03810d33a205d4fb27e13a624c2303f8dd8f202b50f6 was carried out on the Monero network on 2014-07-20 06:18:59. The transaction has 3105157 confirmations. Total output fee is 0.007694290000 XMR.

Timestamp: 1405837139 Timestamp [UTC]: 2014-07-20 06:18:59 Age [y:d:h:m:s]: 10:065:12:59:16
Block: 136661 Fee (per_kB): 0.007694290000 (0.007605166950) Tx size: 1.0117 kB
Tx version: 1 No of confirmations: 3105157 RingCT/type: no
Extra: 0221008008b42891e705768e2a5cb6b2369c6fe2677ce89d083385e859ff968db34bb601742c2f27c98450f219e819a81e773062fd8d5c3832d6554611c5ba9fe85057a5

7 output(s) for total of 3.502305710000 xmr

stealth address amount amount idx tag
00: 79d01481e2c8a9466da8065b6bc12829acbc3953a8f64bea7f4d3f0ba36e8c81 0.002305710000 0 of 1 -
01: c1aa15314f443e17f206dc851a6e1c65e2ca781650861119b02b638a2b9f3945 0.020000000000 200995 of 381490 -
02: c312bc0983312a933a64825f46b25b30edd1a486c8b3e8d0a4ffd182c5ac5e04 0.080000000000 79914 of 269575 -
03: c8638a7f84cc8472ce98e3b55ae346ec68a527dda23c7a8b3f4c8504c0fc7931 0.100000000000 297570 of 982315 -
04: 7a85686c297ead0cf39ac036fb3f5430c1585171ddf109aa9ebedf27ae540276 0.300000000000 109021 of 976536 -
05: fbeb3c5efe05b8cbf9db865472964264254b3ac7e31d8b7ff6afcecb946169e3 1.000000000000 117889 of 874629 -
06: 74037e11edb6513406a4fb2e5f4a48a8ff8f0585a203927d726a60cf750c88e9 2.000000000000 47435 of 434057 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-04-22 07:50:17 till 2014-07-20 07:06:44; resolution: 0.52 days)

  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |_______________________________________________________________*_________________________________________________________________________________________________________*|
  • |______________________________________________________________________________________*__________________________________________________________________________________*|
  • |________________________________________________________________________________*________________________________________________________________________________________*|

4 inputs(s) for total of 3.510000000000 xmr

key image 00: f166535b3df6d713f759e0b7b21845f7c0392baac0cda538c081e8d6c459baaa amount: 0.400000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d00a434fdea020a26cce9d9fc7d57a61f3eca14eb5fc482bc9952fdba62fa186 00006122 0 0/8 2014-04-22 08:50:17 10:154:10:27:58
- 01: cafe2bbe905228a603010e771d4ee169cec2846183849a43a02c4e21a70f8456 00136632 2 2/55 2014-07-20 05:48:30 10:065:13:29:45
key image 01: bc084d9dbc195a31f75a92598b4e75c14b2bea30181f3a89bebbc82d9005c0e2 amount: 0.080000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a06654656e90fab6d767e2d31adfb8a95366b69f4e9b171db3bb8f3935f9c5aa 00055450 1 2/10 2014-05-25 04:41:03 10:121:14:37:12
- 01: 64ef08d91924f6ed47d4ad18d5ee42d204b39a0ce0622489dba11ee47191e527 00136643 2 1/7 2014-07-20 06:06:44 10:065:13:11:31
key image 02: 205a2ca46eadc73e1fb174db56fd82a63b00838534596f1037db6c0ef82823e8 amount: 0.030000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 06d5777ea028844c06d6d53baa11c5e371a4ab9bd4ea94afaf67c34ce7e49c92 00073222 0 0/5 2014-06-06 10:49:03 10:109:08:29:12
- 01: 09a4853494cb62fde6a2d30b310a3487b5074ce23eea4b144de2852b953c523e 00136616 2 4/8 2014-07-20 05:22:32 10:065:13:55:43
key image 03: cc74e08c5ba98b8560eced6a970552d8a6b3e26c51dc1e74575168f4628a316e amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4131aa568fc8a46355a6c22b9c8a97e61d1647dc0d02cac75b3ed1ce6a5c177b 00068450 1 2/52 2014-06-03 03:00:11 10:112:16:18:04
- 01: f984ed5c4eccc38524143d8ec07785064062632cd45f5a48765b014318b91055 00136635 2 6/7 2014-07-20 05:53:03 10:065:13:25:12
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 400000000000, "key_offsets": [ 619, 96279 ], "k_image": "f166535b3df6d713f759e0b7b21845f7c0392baac0cda538c081e8d6c459baaa" } }, { "key": { "amount": 80000000000, "key_offsets": [ 8285, 71622 ], "k_image": "bc084d9dbc195a31f75a92598b4e75c14b2bea30181f3a89bebbc82d9005c0e2" } }, { "key": { "amount": 30000000000, "key_offsets": [ 45791, 104069 ], "k_image": "205a2ca46eadc73e1fb174db56fd82a63b00838534596f1037db6c0ef82823e8" } }, { "key": { "amount": 3000000000000, "key_offsets": [ 3499, 27274 ], "k_image": "cc74e08c5ba98b8560eced6a970552d8a6b3e26c51dc1e74575168f4628a316e" } } ], "vout": [ { "amount": 2305710000, "target": { "key": "79d01481e2c8a9466da8065b6bc12829acbc3953a8f64bea7f4d3f0ba36e8c81" } }, { "amount": 20000000000, "target": { "key": "c1aa15314f443e17f206dc851a6e1c65e2ca781650861119b02b638a2b9f3945" } }, { "amount": 80000000000, "target": { "key": "c312bc0983312a933a64825f46b25b30edd1a486c8b3e8d0a4ffd182c5ac5e04" } }, { "amount": 100000000000, "target": { "key": "c8638a7f84cc8472ce98e3b55ae346ec68a527dda23c7a8b3f4c8504c0fc7931" } }, { "amount": 300000000000, "target": { "key": "7a85686c297ead0cf39ac036fb3f5430c1585171ddf109aa9ebedf27ae540276" } }, { "amount": 1000000000000, "target": { "key": "fbeb3c5efe05b8cbf9db865472964264254b3ac7e31d8b7ff6afcecb946169e3" } }, { "amount": 2000000000000, "target": { "key": "74037e11edb6513406a4fb2e5f4a48a8ff8f0585a203927d726a60cf750c88e9" } } ], "extra": [ 2, 33, 0, 128, 8, 180, 40, 145, 231, 5, 118, 142, 42, 92, 182, 178, 54, 156, 111, 226, 103, 124, 232, 157, 8, 51, 133, 232, 89, 255, 150, 141, 179, 75, 182, 1, 116, 44, 47, 39, 201, 132, 80, 242, 25, 232, 25, 168, 30, 119, 48, 98, 253, 141, 92, 56, 50, 214, 85, 70, 17, 197, 186, 159, 232, 80, 87, 165 ], "signatures": [ "f346db259d06405c19e0d0bd0d80aa7f5cb3ae5e7322af28134b967cfdc95c05292b6b3e02212f9c3406da6714e650e37db1b0cdb65f7cc4e9532dea560097025289f50629fe5f19fd5f3aaaf57d6cc79d30ccd679d658d363ebbcb53e155e022fa5b6a0f20635f2254a9dc15766499aa4103619d2f86f7c4f94249cdfce2005", "2e40e4442f1a9d65f3f464bccdb2cf6f7d9ea24be5790e83fc3c2113786c020b8516d7ada6ab8b86a4f88a478d718eb9196b2481f451114fa0d16ecb907c370b08606e5859c0e97a66df0fe09003b769cb7436337198e882b133fe31a6a8330a3b8cc04f63ee53d82d9c8e9691663f0eb06a5a554bfb704195968220d35f5c04", "ad931903c8b45e530266e7655c924a4f992acf4b95d1f69d4db268cc330bfb0897cfba226e1d29f628ad45ed727558743c85c28df7cdda765169180e523d0f0b2b3ad2f8aa3bfb49b997662f7f3ec5bd994ee69ff8c914966b6a2db7bf793504a621e2a56aec6436ed3627fe2e313f50734a280038f8b426df63207e7812f706", "70b28ca4001e11706fd377dfc69c039bd98ab7b54dde743eff559cf73554f507260ba1abe88fe647d718de3d7fd5782d356748911ec7b69d5509fc2e2fff4307096972de87b45d0d36d11de321a85b23debfe862c96263cf7fc73d38eb3f1a0e193ca21e16e8957353cf6cdce0bc66cb6c8e4dc274cfe15089ba0c21bb571600"] }


Less details
source code | moneroexplorer