Monero Transaction 988f342b3aa381272afb907309fb09447dd08e05154c28ef247dcf35ceabf588

Autorefresh is OFF

Tx hash: 988f342b3aa381272afb907309fb09447dd08e05154c28ef247dcf35ceabf588

Tx prefix hash: 09b7ae1d299c6927d34c17520098655107812e57845485b2f526bb8fc3569886
Tx public key: aab1492ecf2d6d08c28a4a36e756932891767b9c3f660cce3ba4d874521e31dd
Payment id: 5bf6e4dbe272324faa0790d3e5c30a4e12ee328118ad62d8e701869a829497b1

Transaction 988f342b3aa381272afb907309fb09447dd08e05154c28ef247dcf35ceabf588 was carried out on the Monero network on 2014-08-02 02:18:28. The transaction has 3132309 confirmations. Total output fee is 0.005876980000 XMR.

Timestamp: 1406945908 Timestamp [UTC]: 2014-08-02 02:18:28 Age [y:d:h:m:s]: 10:116:02:44:08
Block: 155131 Fee (per_kB): 0.005876980000 (0.006671870865) Tx size: 0.8809 kB
Tx version: 1 No of confirmations: 3132309 RingCT/type: no
Extra: 0221005bf6e4dbe272324faa0790d3e5c30a4e12ee328118ad62d8e701869a829497b101aab1492ecf2d6d08c28a4a36e756932891767b9c3f660cce3ba4d874521e31dd

8 output(s) for total of 5.700123020000 xmr

stealth address amount amount idx tag
00: 71f42371bb955ad6f98dea1aa66d0af57063e20d9d454263357af0fcab3d58ff 0.004123020000 0 of 1 -
01: a3365ca736387a5ce11602268b775978f7e4ceba74b0de129a3f11380f207107 0.006000000000 177387 of 256624 -
02: 8824cb24bf8dfe5316badb22b2fb479bbec821ae69c51aee4c01e1503a4badee 0.020000000000 207692 of 381492 -
03: 1aa669317b4baff035c2a599266b3fc65b04563c190c663a7244b739308fa800 0.070000000000 90430 of 263947 -
04: 14bf5285485c3b3aa39f3e5c0ced9da060ee755e8eb4bc840e63541b13e50a98 0.300000000000 139777 of 976536 -
05: b693182fe864d7135fbc817e411456ee85aee4bdaa550cb007bc8aca0ca70cd3 0.300000000000 139778 of 976536 -
06: 54353fc167188cfa497a60d3e7a11d52c9336e4460a1601270195ce450caca0b 2.000000000000 62015 of 434057 -
07: a18d1aee7e449f75ee348aa8f43cf9a6e36940596b8ed60621ac073f842c8ee9 3.000000000000 38845 of 300495 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-25 07:23:32 till 2014-08-02 02:31:13; resolution: 0.40 days)

  • |____________________________________*____________________________________________________________________________________________________________________________________*|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |_____________________________________________________________________________________________________________________________*___________________________________________*|

3 inputs(s) for total of 5.706000000000 xmr

key image 00: f08c503810859d62875bb1964656a18709489557b8ccb7868da565180fe38a08 amount: 0.700000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7ad9d3950735eff392ca25eff2c7042c22f6ee4aed638043b6b780b9c80a5ecb 00076396 1 8/117 2014-06-08 16:32:45 10:170:12:29:51
- 01: 216e07a830898937da7a65db0925b075c6136747b586fc116b4d4423448b8c77 00155100 2 2/65 2014-08-02 01:31:13 10:116:03:31:23
key image 01: 7a0cebb6112fcdbe43ca8858dcfc50756747ddd1dd72677d327501179753a70b amount: 0.006000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 70a117e4bc62280864590d5c20265260a4fa11a9f0c5a93c191c783af7bf352f 00055680 1 8/112 2014-05-25 08:23:32 10:184:20:39:04
- 01: f5afde0080a5b89528709d1b46228cc72104941833386554e2551b488286b158 00155032 2 2/8 2014-08-02 00:14:33 10:116:04:48:03
key image 02: bd68abcde0a12887a92da3ad89b089fdf8c7296de324df559d0526d104008d42 amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 394cde7077aa157c2369ac865ae524300c627194ed276894271dbbdae816371f 00128704 0 0/5 2014-07-14 19:10:42 10:134:09:51:54
- 01: 7f705fa9b041559195ebcfa0713c49dea90737c24324e099e33d1a0ad6d1fe9b 00154865 2 3/6 2014-08-01 21:35:09 10:116:07:27:27
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 700000000000, "key_offsets": [ 13513, 78422 ], "k_image": "f08c503810859d62875bb1964656a18709489557b8ccb7868da565180fe38a08" } }, { "key": { "amount": 6000000000, "key_offsets": [ 13186, 164162 ], "k_image": "7a0cebb6112fcdbe43ca8858dcfc50756747ddd1dd72677d327501179753a70b" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 52401, 31617 ], "k_image": "bd68abcde0a12887a92da3ad89b089fdf8c7296de324df559d0526d104008d42" } } ], "vout": [ { "amount": 4123020000, "target": { "key": "71f42371bb955ad6f98dea1aa66d0af57063e20d9d454263357af0fcab3d58ff" } }, { "amount": 6000000000, "target": { "key": "a3365ca736387a5ce11602268b775978f7e4ceba74b0de129a3f11380f207107" } }, { "amount": 20000000000, "target": { "key": "8824cb24bf8dfe5316badb22b2fb479bbec821ae69c51aee4c01e1503a4badee" } }, { "amount": 70000000000, "target": { "key": "1aa669317b4baff035c2a599266b3fc65b04563c190c663a7244b739308fa800" } }, { "amount": 300000000000, "target": { "key": "14bf5285485c3b3aa39f3e5c0ced9da060ee755e8eb4bc840e63541b13e50a98" } }, { "amount": 300000000000, "target": { "key": "b693182fe864d7135fbc817e411456ee85aee4bdaa550cb007bc8aca0ca70cd3" } }, { "amount": 2000000000000, "target": { "key": "54353fc167188cfa497a60d3e7a11d52c9336e4460a1601270195ce450caca0b" } }, { "amount": 3000000000000, "target": { "key": "a18d1aee7e449f75ee348aa8f43cf9a6e36940596b8ed60621ac073f842c8ee9" } } ], "extra": [ 2, 33, 0, 91, 246, 228, 219, 226, 114, 50, 79, 170, 7, 144, 211, 229, 195, 10, 78, 18, 238, 50, 129, 24, 173, 98, 216, 231, 1, 134, 154, 130, 148, 151, 177, 1, 170, 177, 73, 46, 207, 45, 109, 8, 194, 138, 74, 54, 231, 86, 147, 40, 145, 118, 123, 156, 63, 102, 12, 206, 59, 164, 216, 116, 82, 30, 49, 221 ], "signatures": [ "a065e056ae3d6582b7e05256fb32ee5feb760376ccb4742dbfb427a4b59d5f03de9498f6d77e69302f0131c4c42e30e0c741d504311f69191c22e9643e66f307287d87f3071599ff2c136c4e2958cf6134ab4c03ea41fcf6bd8776b07937320869e982b84c3d69cad8c43971fbc519c2ddb64db9aec92f4cae56f5a83c619c07", "bd0ced5849dc43240ddcc7cd3f23e066053687ef96851c4d00b4649ff8a3b40865b0526bef09e19c37e218db1a26e01ded5000c70c53bc4c676c602c359de5011edcd1a54347678a3122e7a17457457c0a6cd42d17708613ebdb15efceed56075963afe8f4640a5518b204fb232904814743569dff6a701019962710f7902605", "169979dd840e6e4004019c414383a2930ee07663c4d6cea82c48d87214120003ba033387f426ebbff4122033bf109db72defcd6429028465b95fd2d60f653607db760eda2c1e083c8ce68ff8a7f2ab19016601a143ade48528f1e7b2a352710779c1f26982998ad4bb42b5d6a715d98ba44f383de63edaadb36b57df8429c40e"] }


Less details
source code | moneroexplorer