Monero Transaction a2ffb22dcb5dce1eb7e73d29f996d2e037a32595b26cfd6a2a9794209d447edb

Autorefresh is OFF

Tx hash: a2ffb22dcb5dce1eb7e73d29f996d2e037a32595b26cfd6a2a9794209d447edb

Tx prefix hash: 54900ec4c05e148febd9ecd1e18486f07709d091ec21e27cb7fadfea7f9331be
Tx public key: 4b23d72ba4ccfc885f0f8a17e7d3687be29eca8d6da7937103af5cd6397bcd31
Payment id: 601779b27d6c7ccf6b281f3dc1b17fa7927a30d57cf4967b7014baff06634d55

Transaction a2ffb22dcb5dce1eb7e73d29f996d2e037a32595b26cfd6a2a9794209d447edb was carried out on the Monero network on 2014-07-19 20:02:07. The transaction has 3144264 confirmations. Total output fee is 0.009528420001 XMR.

Timestamp: 1405800127 Timestamp [UTC]: 2014-07-19 20:02:07 Age [y:d:h:m:s]: 10:119:12:22:07
Block: 136051 Fee (per_kB): 0.009528420001 (0.015891045735) Tx size: 0.5996 kB
Tx version: 1 No of confirmations: 3144264 RingCT/type: no
Extra: 022100601779b27d6c7ccf6b281f3dc1b17fa7927a30d57cf4967b7014baff06634d55014b23d72ba4ccfc885f0f8a17e7d3687be29eca8d6da7937103af5cd6397bcd31

5 output(s) for total of 4.790471579999 xmr

stealth address amount amount idx tag
00: 0903c1b614a7221f45a4a920d2a1b1096057754748179abe73e34de33eaf95d6 0.000471579999 0 of 1 -
01: df889f507c375094910b0331b3c72c6595f09e2684f602ee6898dfa38a9b3936 0.090000000000 84553 of 317822 -
02: 3ed85f5e5267e060c95382c34194ca84475af31a768261b5e7c63fbdbdbd4c67 0.700000000000 72578 of 514467 -
03: 4a054d53742e9a114eaa40cd7dbc87f5ca49447f83ceb94213148c52b0691bf9 1.000000000000 116634 of 874629 -
04: 887bfbfe4f3fe53bc5150c046b84bea501175d6881989df00adcdc1d6dcef57e 3.000000000000 30554 of 300495 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-07 11:04:31 till 2014-07-19 20:50:37; resolution: 0.25 days)

  • |____________________________________________________*____________________________________________________________________________________________________________________*|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 4.800000000000 xmr

key image 00: 244328c251cd20b93ef3628365dce413bf2e58e72363f016096e3dcd8ab2d1fe amount: 0.800000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 323d9c882b5cbc357cc54e14de89f21b7bab9f7c855a8674ce063394357d1ede 00093334 1 17/41 2014-06-20 07:14:50 10:149:01:09:24
- 01: e3a2dd535418a938e32f7d0e6adab4114dac99d289517409309a2fb35c3ccf09 00136029 2 2/9 2014-07-19 19:40:14 10:119:12:44:00
key image 01: c17e345471035f924e3ec7d73826b6d0bebf11acb593423ab8bd9c1587cb3b66 amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 397244b54cca4c6e57cb45bdff2fa708f2ac94ecf19e6349651813cae0b4db18 00074674 1 138/2 2014-06-07 12:04:31 10:161:20:19:43
- 01: 877ff4c5125b1629c411c9d975c0ee56ed744dac228d52ad6f734681f5c5f780 00136040 2 4/9 2014-07-19 19:50:37 10:119:12:33:37
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 800000000000, "key_offsets": [ 23179, 50109 ], "k_image": "244328c251cd20b93ef3628365dce413bf2e58e72363f016096e3dcd8ab2d1fe" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 4944, 20154 ], "k_image": "c17e345471035f924e3ec7d73826b6d0bebf11acb593423ab8bd9c1587cb3b66" } } ], "vout": [ { "amount": 471579999, "target": { "key": "0903c1b614a7221f45a4a920d2a1b1096057754748179abe73e34de33eaf95d6" } }, { "amount": 90000000000, "target": { "key": "df889f507c375094910b0331b3c72c6595f09e2684f602ee6898dfa38a9b3936" } }, { "amount": 700000000000, "target": { "key": "3ed85f5e5267e060c95382c34194ca84475af31a768261b5e7c63fbdbdbd4c67" } }, { "amount": 1000000000000, "target": { "key": "4a054d53742e9a114eaa40cd7dbc87f5ca49447f83ceb94213148c52b0691bf9" } }, { "amount": 3000000000000, "target": { "key": "887bfbfe4f3fe53bc5150c046b84bea501175d6881989df00adcdc1d6dcef57e" } } ], "extra": [ 2, 33, 0, 96, 23, 121, 178, 125, 108, 124, 207, 107, 40, 31, 61, 193, 177, 127, 167, 146, 122, 48, 213, 124, 244, 150, 123, 112, 20, 186, 255, 6, 99, 77, 85, 1, 75, 35, 215, 43, 164, 204, 252, 136, 95, 15, 138, 23, 231, 211, 104, 123, 226, 158, 202, 141, 109, 167, 147, 113, 3, 175, 92, 214, 57, 123, 205, 49 ], "signatures": [ "1ce79a4f4b0c73a09191f3dcc67684f8b64120a49839b566269d9404b0a42801a32e730ba9877fde827b29804ca474be5746777db749663d781531a9582c55060cd6b0dea50e38757ddc4d767e878daa7af7cbf64a36935fe5b257d27e88d70bb624e77c7a7f04cd8d33d4a61c760954189c6c2e4c8a7ea7a45336bf7dad7500", "059b5a6575dd3778b9db45b2257d304f3d8eacda7da9f70621b8a39aac3d430b50028d1638998bea129ec8dfa0def31940f2fb96b5532665fa099e44f8fbbf05bfa7a6afb3c9350ad52e383c6d03fe540356ee94584fee61e1765f2f1580880597b3b1c4a980e4467739a318c350126fee00b451575b12a49c815523f22ff10a"] }


Less details
source code | moneroexplorer