Monero Transaction a134220d8ac808c83ad3befd0a85d8f6b15acf1a0d4637f653c25eac84ce9971

Autorefresh is OFF

Tx hash: a134220d8ac808c83ad3befd0a85d8f6b15acf1a0d4637f653c25eac84ce9971

Tx prefix hash: 8f8071a4e440bb456306083d1cec9ab4318ebab0cc5cc7365a305da3632a0f34
Tx public key: 31a72e643f5fc2074ace80028677677041047606656db3fb3ef8134d1f63a0ba
Payment id: c4322fb95cd44ecab350ac752cf6ef3b5529ea8a511f46fe8c3863c6ee0738e8

Transaction a134220d8ac808c83ad3befd0a85d8f6b15acf1a0d4637f653c25eac84ce9971 was carried out on the Monero network on 2014-07-14 11:46:24. The transaction has 3150145 confirmations. Total output fee is 0.005917394742 XMR.

Timestamp: 1405338384 Timestamp [UTC]: 2014-07-14 11:46:24 Age [y:d:h:m:s]: 10:122:03:19:04
Block: 128256 Fee (per_kB): 0.005917394742 (0.007574265270) Tx size: 0.7812 kB
Tx version: 1 No of confirmations: 3150145 RingCT/type: no
Extra: 022100c4322fb95cd44ecab350ac752cf6ef3b5529ea8a511f46fe8c3863c6ee0738e80131a72e643f5fc2074ace80028677677041047606656db3fb3ef8134d1f63a0ba

5 output(s) for total of 5.486000000000 xmr

stealth address amount amount idx tag
00: 2a72ba67d3e145ecb42c395274b9f8b08141c00f1d16d4b44b6991c7ea8947a8 0.006000000000 170257 of 256624 -
01: 92d40305fe81be5a2a5d126dc0a319a845717cedc79c341beabf8c3f07e64c45 0.080000000000 77258 of 269576 -
02: 6b853e9f31f57e5dc0fe5cf8e8371b8044c7ff5e12ff3696a4769a3bd037949f 0.400000000000 84698 of 688584 -
03: 11b68fd3a3f45333c74f42152a5c10fa56f57eeacab7db9722c4f62876f21f38 1.000000000000 101226 of 874629 -
04: 7eb60c61ba400a000504ba87e15c0c73e7f45a00acc5d10d3674a68970cfca5e 4.000000000000 22608 of 237197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-23 01:54:07 till 2014-07-14 09:16:20; resolution: 0.13 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |______________________________________________________________________________________*___________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_________________________________________________________________________________________________________________________________________________________________________*|

5 inputs(s) for total of 5.491917394742 xmr

key image 00: ddc81968184de97bfb7866ed990a7e6357ce6e1dbe1a040415e280e9f8d9af8a amount: 0.001917394742
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 68be4adf292d43fcf8f8a447f617be3604f9413797aa6af97b9add3e21ed3c34 00097560 1 2/128 2014-06-23 02:54:07 10:143:12:11:21
key image 01: 2423b3e92eaefdf1b5e15a57956c22f384e319efc3a7bcff716dcd9438d47abd amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1cd2d4c9ae56d454a9901325e5e347a9d9e512717a835d6f2e9ca84771e2a6b2 00128058 1 1/9 2014-07-14 08:16:20 10:122:06:49:08
key image 02: b402443cfacb54926e9e6096fb99109b803a3d9a8e2898cb0874e0d78e9fc3e4 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: fb27fa0d8ee0a463355a8a328632868ed064cebfa10b4e010d644bbcf53d59ed 00113066 1 32/4 2014-07-03 21:35:06 10:132:17:30:22
key image 03: 5ca7c6c7854ed249e3e1e7a7f0a00d75971ffdb7c821f59a362f72ab91c2fe29 amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ba4d83179c5850a91d97ae37c8a7c9394e72369283bfc002b9d5bc1075f88eed 00128058 1 1/9 2014-07-14 08:16:20 10:122:06:49:08
key image 04: 776ade75bfe20d640c75f46ad7d36116ddc95fdf04022bf911c2d87943abf6f0 amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 81e188418d43fa72b95dfc01bea690672700c53088f6fec147e537c2ba448e51 00128058 1 1/9 2014-07-14 08:16:20 10:122:06:49:08
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 1917394742, "key_offsets": [ 0 ], "k_image": "ddc81968184de97bfb7866ed990a7e6357ce6e1dbe1a040415e280e9f8d9af8a" } }, { "key": { "amount": 200000000000, "key_offsets": [ 193801 ], "k_image": "2423b3e92eaefdf1b5e15a57956c22f384e319efc3a7bcff716dcd9438d47abd" } }, { "key": { "amount": 200000000000, "key_offsets": [ 137326 ], "k_image": "b402443cfacb54926e9e6096fb99109b803a3d9a8e2898cb0874e0d78e9fc3e4" } }, { "key": { "amount": 90000000000, "key_offsets": [ 79983 ], "k_image": "5ca7c6c7854ed249e3e1e7a7f0a00d75971ffdb7c821f59a362f72ab91c2fe29" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 51598 ], "k_image": "776ade75bfe20d640c75f46ad7d36116ddc95fdf04022bf911c2d87943abf6f0" } } ], "vout": [ { "amount": 6000000000, "target": { "key": "2a72ba67d3e145ecb42c395274b9f8b08141c00f1d16d4b44b6991c7ea8947a8" } }, { "amount": 80000000000, "target": { "key": "92d40305fe81be5a2a5d126dc0a319a845717cedc79c341beabf8c3f07e64c45" } }, { "amount": 400000000000, "target": { "key": "6b853e9f31f57e5dc0fe5cf8e8371b8044c7ff5e12ff3696a4769a3bd037949f" } }, { "amount": 1000000000000, "target": { "key": "11b68fd3a3f45333c74f42152a5c10fa56f57eeacab7db9722c4f62876f21f38" } }, { "amount": 4000000000000, "target": { "key": "7eb60c61ba400a000504ba87e15c0c73e7f45a00acc5d10d3674a68970cfca5e" } } ], "extra": [ 2, 33, 0, 196, 50, 47, 185, 92, 212, 78, 202, 179, 80, 172, 117, 44, 246, 239, 59, 85, 41, 234, 138, 81, 31, 70, 254, 140, 56, 99, 198, 238, 7, 56, 232, 1, 49, 167, 46, 100, 63, 95, 194, 7, 74, 206, 128, 2, 134, 119, 103, 112, 65, 4, 118, 6, 101, 109, 179, 251, 62, 248, 19, 77, 31, 99, 160, 186 ], "signatures": [ "4858e705d73da180d1103151c6b058bf859d80ca56e1f3ba3e351f970831580d77a2fb1f6254dc12556251d3e7e2684ec2d3366f38ecb6f65881bf738b2c9805", "af514fbdfbde1ef6c405fae81abaff583906fa1c270d51961b133e9e5158b30fae8e1e1e79d022ca74d0766b602399cff27f7c376c6d0a8e5434ffa4fbe5730f", "951f98cfa4493fd6dc95e0419d6762556f4dbb168edcc9f6a1b303869c714d0f054ce2b51dfb7cf119270b7b6d28777c1f0e40608413e579405fc5acdce54202", "b7d6e6fcb92eb9c8252f6b33f12381fae567a07ce22f1b4847979ad9c2e3cb0a0f4886a982a5f27f6d2451b9e7ded03fe4944ffa2943e8be808944c6e7fc3a01", "3108761fecf7199bbecf7b34da00c984924693f8a4c8370aa1c9782f7d49780d848b44559c49bb46df133ff04ae12754ecf887320ad2723e1c012b9c0fa5be0b"] }


Less details
source code | moneroexplorer