Monero Transaction adffce68f314b403860d91c40bc9d5c214972b457948832f34346463ec778caf

Autorefresh is OFF

Tx hash: adffce68f314b403860d91c40bc9d5c214972b457948832f34346463ec778caf

Tx prefix hash: d4da1009f0eb440e25a942dc28f809f648277bf192d3dbfdb290e492105fda23
Tx public key: 87ea1dc7a1b38e20340caefe5a978de6f79d2294b5ab059944af5a1f6114a60c
Payment id: 414160d793e94d39be1e8a6213452a4369bdf334302242fc8dc3c153cb0f89ee

Transaction adffce68f314b403860d91c40bc9d5c214972b457948832f34346463ec778caf was carried out on the Monero network on 2014-05-29 13:59:06. The transaction has 3239506 confirmations. Total output fee is 0.005900000000 XMR.

Timestamp: 1401371946 Timestamp [UTC]: 2014-05-29 13:59:06 Age [y:d:h:m:s]: 10:199:22:40:14
Block: 61822 Fee (per_kB): 0.005900000000 (0.006127383367) Tx size: 0.9629 kB
Tx version: 1 No of confirmations: 3239506 RingCT/type: no
Extra: 022100414160d793e94d39be1e8a6213452a4369bdf334302242fc8dc3c153cb0f89ee0187ea1dc7a1b38e20340caefe5a978de6f79d2294b5ab059944af5a1f6114a60c

7 output(s) for total of 255.515000000000 xmr

stealth address amount amount idx tag
00: 9609df2936c88ac3e3386d06a4b0081ea0bc885488a3a061d24759dc75054a48 0.005000000000 29743 of 308585 -
01: 2bd4848dea1b6361a2fa4a8b9dbe3555a0668b2bafac0e13f44cb39638121e7d 0.030000000000 22693 of 324336 -
02: 5b4247aa12a4d72d8ea9efae559d9a7e76ba8d528a2a33664a200503567bb0dd 0.080000000000 13230 of 269576 -
03: 3832eb38ee7bfd1e90ad671ac1dd39a12cc167d98e98618425fd94ca6bd27e20 0.400000000000 10210 of 688584 -
04: 4522ed69395f0773ea0b4ff9761373cdbf91323f9b923a744004379cb4b5523f 5.000000000000 2471 of 255089 -
05: 9bd0db570c7532126607f0375906cfdaddbbbc6fa272d0d6bde6eed93bbac6c5 50.000000000000 659 of 44703 -
06: 84f3eda91e7ad662793b051d479e6396993ae6b5f2e3a8b7f1e61f18e7c41c39 200.000000000000 937 of 31883 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-25 23:54:27 till 2014-05-29 06:12:07; resolution: 0.02 days)

  • |___*______________________________________________________________________________________________________________________________________________________________________|
  • |_______________________________________________________________________________________________________________________________________________________________________*__|
  • |_______________________________________________________________________________________________________________________________________________________________________*__|
  • |_______________________________________________________________________________________________________________________________________________________________________*__|
  • |_______________________________________________________________________________________________________________________________________________________________________*__|
  • |_______________________________________________________________________________________________________________________________________________________________________*__|

6 inputs(s) for total of 255.520900000000 xmr

key image 00: 5eef65376543ff4bffc8469446857a7d4ec5027f6f5b9c81a13e14d08ecfa0f6 amount: 0.000900000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 85c3d72bbca010784ae7c6b4be28e966e121b47fb0cc4991f010390af5d7c7fe 00056610 1 16/276 2014-05-26 00:54:27 10:203:11:44:53
key image 01: a622b5d981b1a366e208267555fd07493c1def74e0a9477f5cdf4d35f691bfbd amount: 200.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f925daf10a4ea240715dd7646956cee89e339a7d5031209296468a34f3df9d73 00061423 1 49/18 2014-05-29 05:12:07 10:200:07:27:13
key image 02: ba879d4041f098e418a7c69a0e334ab7272dce4a5448ac9de6d7ed3782376196 amount: 0.020000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 612341a9d028a713146047920edf7088bbae3f0a6edebbf6677bab90bd61622c 00061423 1 49/18 2014-05-29 05:12:07 10:200:07:27:13
key image 03: da67bb4e89cda05a3f68f0e90a638b03f406df7e27c3ae12f8dd7847685c19a4 amount: 50.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e6097ec922cf8abc13b72c1c9e4739cd5d68affd0142e4ee23704bcb2e7199a4 00061423 1 49/18 2014-05-29 05:12:07 10:200:07:27:13
key image 04: 06181711d64bcaf54be906b0e15bfd9df119e45f7c1164f7576086ea8b4e7b33 amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9875987efe60309ea28d491931a597f7f20bb1d682d47517bafec0b8f2e71e0b 00061423 1 49/18 2014-05-29 05:12:07 10:200:07:27:13
key image 05: d8b130999198e71efcc4727f8b55c43f9fad3c91aa8926984cf122bb85bd9f8f amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ecaad45308e86580deec4ecd36e6d379089e776ddfdb9012a84f1585a552eeb3 00061423 1 49/18 2014-05-29 05:12:07 10:200:07:27:13
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 900000000, "key_offsets": [ 17253 ], "k_image": "5eef65376543ff4bffc8469446857a7d4ec5027f6f5b9c81a13e14d08ecfa0f6" } }, { "key": { "amount": 200000000000000, "key_offsets": [ 936 ], "k_image": "a622b5d981b1a366e208267555fd07493c1def74e0a9477f5cdf4d35f691bfbd" } }, { "key": { "amount": 20000000000, "key_offsets": [ 30349 ], "k_image": "ba879d4041f098e418a7c69a0e334ab7272dce4a5448ac9de6d7ed3782376196" } }, { "key": { "amount": 50000000000000, "key_offsets": [ 611 ], "k_image": "da67bb4e89cda05a3f68f0e90a638b03f406df7e27c3ae12f8dd7847685c19a4" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 2372 ], "k_image": "06181711d64bcaf54be906b0e15bfd9df119e45f7c1164f7576086ea8b4e7b33" } }, { "key": { "amount": 500000000000, "key_offsets": [ 9207 ], "k_image": "d8b130999198e71efcc4727f8b55c43f9fad3c91aa8926984cf122bb85bd9f8f" } } ], "vout": [ { "amount": 5000000000, "target": { "key": "9609df2936c88ac3e3386d06a4b0081ea0bc885488a3a061d24759dc75054a48" } }, { "amount": 30000000000, "target": { "key": "2bd4848dea1b6361a2fa4a8b9dbe3555a0668b2bafac0e13f44cb39638121e7d" } }, { "amount": 80000000000, "target": { "key": "5b4247aa12a4d72d8ea9efae559d9a7e76ba8d528a2a33664a200503567bb0dd" } }, { "amount": 400000000000, "target": { "key": "3832eb38ee7bfd1e90ad671ac1dd39a12cc167d98e98618425fd94ca6bd27e20" } }, { "amount": 5000000000000, "target": { "key": "4522ed69395f0773ea0b4ff9761373cdbf91323f9b923a744004379cb4b5523f" } }, { "amount": 50000000000000, "target": { "key": "9bd0db570c7532126607f0375906cfdaddbbbc6fa272d0d6bde6eed93bbac6c5" } }, { "amount": 200000000000000, "target": { "key": "84f3eda91e7ad662793b051d479e6396993ae6b5f2e3a8b7f1e61f18e7c41c39" } } ], "extra": [ 2, 33, 0, 65, 65, 96, 215, 147, 233, 77, 57, 190, 30, 138, 98, 19, 69, 42, 67, 105, 189, 243, 52, 48, 34, 66, 252, 141, 195, 193, 83, 203, 15, 137, 238, 1, 135, 234, 29, 199, 161, 179, 142, 32, 52, 12, 174, 254, 90, 151, 141, 230, 247, 157, 34, 148, 181, 171, 5, 153, 68, 175, 90, 31, 97, 20, 166, 12 ], "signatures": [ "da5f2cf4cfe97ba65f225dcc80d4ad609770d6687da3e3482900d5298fbd6702bc38944fe72aef47c8d3644ce0f0934521cf806921804bd27a5140e998ab4005", "bed6acec6504b86e7947105db79455602e6a17a3c9ee818729f26b1ad298bf045384c3c562349eb06336afc4c2bee698ea89aadee273909cdd628455b538230d", "71e5a7483d42e8122425adb13c9406ebd63592a614fa988ec68eeb1451c8be0c22ce57f818e97717d809c41707805184f019cfa18424e0bde2040c33da90d703", "17b47fcd8ec551a10bd096986b8a04a0a8f3a0ca57889d02d07ca15c8bb9fa0ca6fafc4570fc5010e0bc64c5358baf5d0295dad28a4651f1c9dccfb0e743cd0b", "5a62afc7ae7380bb37f27a0798e005beed71649684cfdcc55bdb2600e2271c07efb96261f85fa2ae93c363f5497819f57655f63ad5f30c5e7a380e87b507c802", "1cbe9f02046a0130ff50ba3fbaff629babd3304dea24d00988d088e1bbf3c50c5440a84135975d34dde37cf0e0ffe88f69e829db8fbcfd73456fd93e5281ad05"] }


Less details
source code | moneroexplorer