Monero Transaction af7982e29d79dd990b4afcc1b00da90b664773887af74905b29aad5de3d45fe7

Autorefresh is OFF

Tx hash: af7982e29d79dd990b4afcc1b00da90b664773887af74905b29aad5de3d45fe7

Tx prefix hash: 317d4bebd9372df8f268b8885c0bba8d8f9ac20956865e49c5587f9531d00152
Tx public key: 5df0a4bd18e0690f592064406d9e7d01116ec3513246226f9b4394e59c2b75d7
Payment id: 1fa1266c53a433e8ffbfec87eff9c16e8d2689fb043a8257bc4262b646d7c803

Transaction af7982e29d79dd990b4afcc1b00da90b664773887af74905b29aad5de3d45fe7 was carried out on the Monero network on 2014-07-13 17:52:08. The transaction has 3166963 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1405273928 Timestamp [UTC]: 2014-07-13 17:52:08 Age [y:d:h:m:s]: 10:144:15:29:10
Block: 127116 Fee (per_kB): 0.005000000000 (0.006368159204) Tx size: 0.7852 kB
Tx version: 1 No of confirmations: 3166963 RingCT/type: no
Extra: 0221001fa1266c53a433e8ffbfec87eff9c16e8d2689fb043a8257bc4262b646d7c803015df0a4bd18e0690f592064406d9e7d01116ec3513246226f9b4394e59c2b75d7

5 output(s) for total of 99.995000000000 xmr

stealth address amount amount idx tag
00: 0d465b70ac468579897f09fa52b26b430a3d179b12d206da313724ee2c879cd1 0.005000000000 187441 of 308585 -
01: 54a3d7ffc85f0aa84200c5d00e8ee0f55a57b2ee37d73f8e15a4e20566bf62d0 0.090000000000 79678 of 317822 -
02: 8d00d2685c401e9b87e9f11c66bd6d2117955d1f581633c96048ad5dde234f0e 0.900000000000 53181 of 454894 -
03: 0b2a17fbb9354b63d24e0ece52a2697db7168df6f67145d52ca8e57ef39824b0 9.000000000000 10601 of 274259 -
04: 6258956e912a1633a04df5e9d125284f1250809bb6a9ac50eea42e507a275878 90.000000000000 1872 of 36286 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-13 14:35:40 till 2014-07-13 16:40:01; resolution: 0.00 days)

  • |________________________________________________________________________________________*_________________________________________________________________________________|
  • |________________________________________________________________________________________*_________________________________________________________________________________|
  • |______________________________________________________________________________________*___________________________________________________________________________________|
  • |__________________________________________________________________________________*_______________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|

5 inputs(s) for total of 100.000000000000 xmr

key image 00: 01a78c28418ba45ccd15f678d84e74ce1aabfbdb97ad59c72989d7f1544ab7e7 amount: 20.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8b002b0e7bc302db102029327d47194ec6e5aa5b3800579123b8688f2d386abd 00126942 11 26/3 2014-07-13 15:39:56 10:144:17:41:22
key image 01: f0259b523ca41f4b041a9ec41a056b18a9e6a7c682e7d3cc6c5941fe65be172f amount: 20.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d674d7fb292f5aaf9df336464fdcf83d591ea903b75fe610df8a23dee0dfcd65 00126943 11 22/3 2014-07-13 15:40:01 10:144:17:41:17
key image 02: ebaac19a7d73440fe5bae7a2570fb079284c27339bd02e2aad56bc1f8f5f6660 amount: 20.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 831c3e00aacddb3a567b1f0532a0f0b5fce8cc7f926d67450a131b8ae0928269 00126939 11 18/4 2014-07-13 15:38:39 10:144:17:42:39
key image 03: 97e5243b9a6160dd7d32c5c71c17e9abbcd2add052994b58f0781792177caa3b amount: 20.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f2a7f8fd2aae933eb3ee2b254be26d3e5f2a4bb7b1d45d6741ece6c4a5b66a89 00126937 11 16/3 2014-07-13 15:35:40 10:144:17:45:38
key image 04: 2146fa96505810cdce94c1cbbe24a4aabb9ebf9701915243e0653ce5453a382e amount: 20.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6f77798ce7c37cb5cd9b8f6043de698eaad285a584c82c80099b61a33ea02cb8 00126938 11 28/2 2014-07-13 15:37:35 10:144:17:43:43
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 20000000000000, "key_offsets": [ 5612 ], "k_image": "01a78c28418ba45ccd15f678d84e74ce1aabfbdb97ad59c72989d7f1544ab7e7" } }, { "key": { "amount": 20000000000000, "key_offsets": [ 5613 ], "k_image": "f0259b523ca41f4b041a9ec41a056b18a9e6a7c682e7d3cc6c5941fe65be172f" } }, { "key": { "amount": 20000000000000, "key_offsets": [ 5610 ], "k_image": "ebaac19a7d73440fe5bae7a2570fb079284c27339bd02e2aad56bc1f8f5f6660" } }, { "key": { "amount": 20000000000000, "key_offsets": [ 5608 ], "k_image": "97e5243b9a6160dd7d32c5c71c17e9abbcd2add052994b58f0781792177caa3b" } }, { "key": { "amount": 20000000000000, "key_offsets": [ 5609 ], "k_image": "2146fa96505810cdce94c1cbbe24a4aabb9ebf9701915243e0653ce5453a382e" } } ], "vout": [ { "amount": 5000000000, "target": { "key": "0d465b70ac468579897f09fa52b26b430a3d179b12d206da313724ee2c879cd1" } }, { "amount": 90000000000, "target": { "key": "54a3d7ffc85f0aa84200c5d00e8ee0f55a57b2ee37d73f8e15a4e20566bf62d0" } }, { "amount": 900000000000, "target": { "key": "8d00d2685c401e9b87e9f11c66bd6d2117955d1f581633c96048ad5dde234f0e" } }, { "amount": 9000000000000, "target": { "key": "0b2a17fbb9354b63d24e0ece52a2697db7168df6f67145d52ca8e57ef39824b0" } }, { "amount": 90000000000000, "target": { "key": "6258956e912a1633a04df5e9d125284f1250809bb6a9ac50eea42e507a275878" } } ], "extra": [ 2, 33, 0, 31, 161, 38, 108, 83, 164, 51, 232, 255, 191, 236, 135, 239, 249, 193, 110, 141, 38, 137, 251, 4, 58, 130, 87, 188, 66, 98, 182, 70, 215, 200, 3, 1, 93, 240, 164, 189, 24, 224, 105, 15, 89, 32, 100, 64, 109, 158, 125, 1, 17, 110, 195, 81, 50, 70, 34, 111, 155, 67, 148, 229, 156, 43, 117, 215 ], "signatures": [ "3a90293fe3a6161939da9b471c5dae7656c7d91828b8f44e8d307257a76dd50894c2c5875132b2d5020cb87aa3331e854c863e32a999dcd66cbf20a20572a605", "3e4cc3809f0d3f37079c137a03fc4ade35fcf9b610de8aa4506f9b788ff5660447defb020c10ad78351f17608d552d3bd06cb06f640f91a1e3e6a7c99466490b", "7d5110cf120e2479995471deb83d6d9fe8db5db7053714905487a9fbf924ef036853ad306250deafabec5bf13c532fbcff8c53ea7d97c6123646454bbfa9390c", "c1874a14db915e3e7bcd4bec03cb187c90b70ff3cf22ed1ef9703b4b2229a500df6089eb4494092cc1eee2b8a23093612f034089355050b9ddc6db76b3722e06", "b654511307ad7e1e1d60d9286e11929e868b87cc87c446fb89acc86f11c9860940eb58bf7134e488e2128630c0963a40c7f8a6de350fa67636108352cbac4a04"] }


Less details
source code | moneroexplorer