Monero Transaction ab1d29872a6d2d1f594df746fbdba4f13d069973db9027c1ff2b459f66dcc0ac

Autorefresh is OFF

Tx hash: ab1d29872a6d2d1f594df746fbdba4f13d069973db9027c1ff2b459f66dcc0ac

Tx prefix hash: b8f010a5b7af168648e42628b082215713aeb98cc7b46e1abac9c26da0dc5fef
Tx public key: d6869e0c9878ede94eae2cd5c7b1b3ceb3da68025bee63f20d52d0f61e88547d

Transaction ab1d29872a6d2d1f594df746fbdba4f13d069973db9027c1ff2b459f66dcc0ac was carried out on the Monero network on 2014-06-14 22:09:53. The transaction has 3204662 confirmations. Total output fee is 0.006737363872 XMR.

Timestamp: 1402783793 Timestamp [UTC]: 2014-06-14 22:09:53 Age [y:d:h:m:s]: 10:168:03:32:12
Block: 85540 Fee (per_kB): 0.006737363872 (0.018397494946) Tx size: 0.3662 kB
Tx version: 1 No of confirmations: 3204662 RingCT/type: no
Extra: 01d6869e0c9878ede94eae2cd5c7b1b3ceb3da68025bee63f20d52d0f61e88547d

6 output(s) for total of 3.993262636128 xmr

stealth address amount amount idx tag
00: 4e51c896c09b2bcd0690d8578b6b04f4f611dc02f2429e205e7737dd16482b80 0.001087545376 0 of 34 -
01: afbaca2b52d0a0d300d5d630711a68808703d102d364740bd79d2059e4db790e 0.001087545376 1 of 34 -
02: d31a9f63930e52b79a309e2dcae2e7939c3d4c190930a6f2c97d6e77ba49d334 0.001087545376 2 of 34 -
03: e0dd9725df7b205400e1ddf906b80baf9b0bb26c47c257d7cff8c855374a0ccc 0.090000000000 45440 of 317822 -
04: 8a3726b2a97203c608ac5a1dcc44700343014badfb0e324693e33fa7ac04adba 0.900000000000 17982 of 454894 -
05: 2c4f445249976bc77eec453968a42700253adbbd1a58045429212a6b988f289c 3.000000000000 9310 of 300495 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-14 20:40:46 till 2014-06-14 22:40:46; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|

1 inputs(s) for total of 4.000000000000 xmr

key image 00: da72131f76466aed57bae9bd1a234b4be65ef0a3b77686393f8d2dd4a3d51642 amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 2a8c7a337abfff13a85fd34fbfafdcfa7066171fedc66d28f2795bd709a54179 00085502 1 1/104 2014-06-14 21:40:46 10:168:04:01:19
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 4000000000000, "key_offsets": [ 8246 ], "k_image": "da72131f76466aed57bae9bd1a234b4be65ef0a3b77686393f8d2dd4a3d51642" } } ], "vout": [ { "amount": 1087545376, "target": { "key": "4e51c896c09b2bcd0690d8578b6b04f4f611dc02f2429e205e7737dd16482b80" } }, { "amount": 1087545376, "target": { "key": "afbaca2b52d0a0d300d5d630711a68808703d102d364740bd79d2059e4db790e" } }, { "amount": 1087545376, "target": { "key": "d31a9f63930e52b79a309e2dcae2e7939c3d4c190930a6f2c97d6e77ba49d334" } }, { "amount": 90000000000, "target": { "key": "e0dd9725df7b205400e1ddf906b80baf9b0bb26c47c257d7cff8c855374a0ccc" } }, { "amount": 900000000000, "target": { "key": "8a3726b2a97203c608ac5a1dcc44700343014badfb0e324693e33fa7ac04adba" } }, { "amount": 3000000000000, "target": { "key": "2c4f445249976bc77eec453968a42700253adbbd1a58045429212a6b988f289c" } } ], "extra": [ 1, 214, 134, 158, 12, 152, 120, 237, 233, 78, 174, 44, 213, 199, 177, 179, 206, 179, 218, 104, 2, 91, 238, 99, 242, 13, 82, 208, 246, 30, 136, 84, 125 ], "signatures": [ "72bff074b3f5b897a9372487192a2223f13ff1bba57ba96867b70c0599ee0a004e51a25f31fae86841335fb79e926a9646831dedace516c92e776b8c0fc7fa0b"] }


Less details
source code | moneroexplorer