Monero Transaction af19bf15a1cdd70ae85a7eaa6dcede66beff59e7dd24c1cf4e28727f43953ebf

Autorefresh is OFF

Tx hash: af19bf15a1cdd70ae85a7eaa6dcede66beff59e7dd24c1cf4e28727f43953ebf

Tx prefix hash: a2c920427b093d36dd389286f180b5492647a3db57a47ba47944a21321f77dd1
Tx public key: d6cf0b52fe49e266b995b80c7af42f6f4a22caac5f134a0c30403497c46d3c45
Payment id: aa1295f7545ec9a4e02973f8cc0b300e8ff32d25c08f385f8eb0b89e18139669

Transaction af19bf15a1cdd70ae85a7eaa6dcede66beff59e7dd24c1cf4e28727f43953ebf was carried out on the Monero network on 2014-07-27 17:47:34. The transaction has 3130730 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1406483254 Timestamp [UTC]: 2014-07-27 17:47:34 Age [y:d:h:m:s]: 10:108:13:41:59
Block: 147446 Fee (per_kB): 0.005000000000 (0.007804878049) Tx size: 0.6406 kB
Tx version: 1 No of confirmations: 3130730 RingCT/type: no
Extra: 022100aa1295f7545ec9a4e02973f8cc0b300e8ff32d25c08f385f8eb0b89e1813966901d6cf0b52fe49e266b995b80c7af42f6f4a22caac5f134a0c30403497c46d3c45

4 output(s) for total of 2.195000000000 xmr

stealth address amount amount idx tag
00: c8b768d9b9898a79eb19a60f23ff9242093b758713d2d82459bb299605048f18 0.005000000000 196351 of 308584 -
01: ece0f925d358753ec6b3a2100bc0e1e6d39880e658b45d9062eeca799f08659f 0.090000000000 90857 of 317822 -
02: 317e116e3ba266479986d4a37c51a322e528bb09426eb1ed27bd934a38b2d583 0.100000000000 326207 of 982315 -
03: 6d1d7173e8abead65c342b9dbc586d1430ce8e9b9029103532b2971453568232 2.000000000000 55769 of 434057 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-27 05:10:12 till 2014-07-27 16:08:45; resolution: 0.00 days)

  • |________________*_________________________________________________________________________________________________________________________________________________________|
  • |________________________________________________________________________________________________________________________________*_________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________*________________|
  • |__________________________________________________________________________________________________________________________________________________________*_______________|

4 inputs(s) for total of 2.200000000000 xmr

key image 00: 87ccd29c54e6654a07f1c92505fcb0d258f7d80e7ad5052d3582b498b7a11e8a amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 86e93b0872325a01378bf2086470d840de7054d5cb639b1e3688f98c1da6a686 00146738 4 6/8 2014-07-27 06:10:12 10:109:01:19:21
key image 01: c018e419f42980e70770153a01c26e7d3f3cac58f5133da1e192cb820f9ab7a0 amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0df346e36202e5d56aba74f8db5b4cc3b3309c1d1cca3671dfb7726f8becf1bd 00147225 4 7/8 2014-07-27 13:27:26 10:108:18:02:07
key image 02: ec57cf6fb1ff5c3fa946ddebef75d861dec850c90156d03f7c13c32ee15af3c5 amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 61f96172e9f9dbda9bfe196140ae8351c9c92cae516db8ee3de24fe6adedfada 00147322 1 80/80 2014-07-27 15:04:04 10:108:16:25:29
key image 03: 21d07f5e9b31f59f1ccbccbf9d68b3c823e10516a92048731cd42b54aa97f447 amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 26e51a11ac25397022c465f713f640366ce5827c523499b8e6c0a880294029a0 00147327 1 20/33 2014-07-27 15:08:45 10:108:16:20:48
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 100000000000, "key_offsets": [ 323956 ], "k_image": "87ccd29c54e6654a07f1c92505fcb0d258f7d80e7ad5052d3582b498b7a11e8a" } }, { "key": { "amount": 100000000000, "key_offsets": [ 325307 ], "k_image": "c018e419f42980e70770153a01c26e7d3f3cac58f5133da1e192cb820f9ab7a0" } }, { "key": { "amount": 1000000000000, "key_offsets": [ 140163 ], "k_image": "ec57cf6fb1ff5c3fa946ddebef75d861dec850c90156d03f7c13c32ee15af3c5" } }, { "key": { "amount": 1000000000000, "key_offsets": [ 140274 ], "k_image": "21d07f5e9b31f59f1ccbccbf9d68b3c823e10516a92048731cd42b54aa97f447" } } ], "vout": [ { "amount": 5000000000, "target": { "key": "c8b768d9b9898a79eb19a60f23ff9242093b758713d2d82459bb299605048f18" } }, { "amount": 90000000000, "target": { "key": "ece0f925d358753ec6b3a2100bc0e1e6d39880e658b45d9062eeca799f08659f" } }, { "amount": 100000000000, "target": { "key": "317e116e3ba266479986d4a37c51a322e528bb09426eb1ed27bd934a38b2d583" } }, { "amount": 2000000000000, "target": { "key": "6d1d7173e8abead65c342b9dbc586d1430ce8e9b9029103532b2971453568232" } } ], "extra": [ 2, 33, 0, 170, 18, 149, 247, 84, 94, 201, 164, 224, 41, 115, 248, 204, 11, 48, 14, 143, 243, 45, 37, 192, 143, 56, 95, 142, 176, 184, 158, 24, 19, 150, 105, 1, 214, 207, 11, 82, 254, 73, 226, 102, 185, 149, 184, 12, 122, 244, 47, 111, 74, 34, 202, 172, 95, 19, 74, 12, 48, 64, 52, 151, 196, 109, 60, 69 ], "signatures": [ "7faa21d406bcf18e8e4a75fc03d5f212dde4b033a9cda7e8af0522db65ae3904452f0573bb037068f914415af4edcf0993679d94f89e82f95f5c06175357170f", "43e39e6da5c918fc5ebfbcd065ebd3eebc141f17d7a3727398a27bd2c3b9ec09f208538d9d2f85764c3df3358b6d2602434e96b690282c3e947e84376d276d0e", "e9127504b7d84aca00efd87a36670ace48d5cb5f459924034b349713c412160f2cf2803d7d9b8c42f878a2c168470f6f8b9f8e45bab0adab0da051cbef6cc500", "dd4531c58d61c8ed2b38ec5aa951de24104bc8b38e1aef8114d645d045f57f035d9c0d28fa4f21fa389858b9ed43c0969c52da85e37f006519d8f0c0c6add90f"] }


Less details
source code | moneroexplorer