Monero Transaction afaf298711931c09aed0ba9c7b620d28a7afccd79d5ad31346fe5fbbc8e6a2b7

Autorefresh is OFF

Tx hash: afaf298711931c09aed0ba9c7b620d28a7afccd79d5ad31346fe5fbbc8e6a2b7

Tx prefix hash: d0d8136f36411f95d2ddda373ac1804af1db7612aa447eb8833313f168621eef
Tx public key: 8816f6a11a21b72b8c68b23c4dbd1d0aa76a95c6d112a134ffadf7b64d684e23

Transaction afaf298711931c09aed0ba9c7b620d28a7afccd79d5ad31346fe5fbbc8e6a2b7 was carried out on the Monero network on 2016-08-25 16:30:31. The transaction has 2167232 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1472142631 Timestamp [UTC]: 2016-08-25 16:30:31 Age [y:d:h:m:s]: 08:093:04:01:44
Block: 1121425 Fee (per_kB): 0.100000000000 (0.136898395722) Tx size: 0.7305 kB
Tx version: 1 No of confirmations: 2167232 RingCT/type: no
Extra: 018816f6a11a21b72b8c68b23c4dbd1d0aa76a95c6d112a134ffadf7b64d684e23de20042a91e32b6dffc62b284736997b42b8e07ab70580e5c4d4e70c794acb5f45cc

5 output(s) for total of 3.960000000000 xmr

stealth address amount amount idx tag
00: 0bbd20c4f6a0874d2384130e83c48240e48c488cca5d39d74cdce6ecfc05dcb2 0.060000000000 220466 of 264760 -
01: 279e8a3cb98134959257e037a7bbdf4571ddd42db0de8d6291fbc6fe5293787e 0.300000000000 852673 of 976536 -
02: 05e06398bcc8df281edde9aa33d9dfa123e167d7c2a0c07580b972fa51578cb7 0.600000000000 593370 of 650760 -
03: f2f39edba14a96e58c4d167c1d8c5366ec2e4a2b072b7f255609dd01482e3b18 1.000000000000 779467 of 874629 -
04: 10e8ad0346720d96a1ff86e61bce73c6db3195487e6dc09f456778ca0d9dd566 2.000000000000 390710 of 434057 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-27 04:46:13 till 2016-08-25 15:41:06; resolution: 4.83 days)

  • |____*________________________________________________________________*___________________________________________________________________________________________________*|
  • |_*_____________________*_________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 4.060000000000 xmr

key image 00: 349cb0c1e79491febae74bb34a4278ca402bc429c46dea2e4dd2200a887b4fd0 amount: 0.060000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a785f10f65fac5a260f7d562a774cddab10fec9f1c7e1682d43da2391d89e0c1 00084513 1 6/94 2014-06-14 06:12:56 10:166:14:19:19
- 01: 99c9ca3658a7135873cb88d39e49e580542a13ce6df920feb809dfcb92ed90ff 00535462 1 7/6 2015-04-25 00:55:10 09:216:19:37:05
- 02: 6f949dacfe1b9538876a36bfc2f0c3c04d4f00c4f71bafde0b9683871fbe50be 01121341 3 4/19 2016-08-25 14:41:06 08:093:05:51:09
key image 01: 9373de8f4827db240b8b19f248bd9a13aaf464c363a2d508e2c3c7eba5c7f1b8 amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 18fa618e8199bfd46e5577c0251fd03068ee18592afefdbcc300a75b8db4f437 00058401 0 0/7 2014-05-27 05:46:13 10:184:14:46:02
- 01: 0c92cbffed690c33957f76d7b0260b7e2fe18abc5b9c2a66182a14982b647dfb 00213608 0 0/4 2014-09-11 19:52:47 10:077:00:39:28
- 02: 34ef816eacf805d7aeeedff380cb31893b48f84dc6b90e6777809c76f5256db9 01120611 3 2/19 2016-08-24 13:26:08 08:094:07:06:07
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 60000000000, "key_offsets": [ 56042, 81750, 82661 ], "k_image": "349cb0c1e79491febae74bb34a4278ca402bc429c46dea2e4dd2200a887b4fd0" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 1708, 85640, 119126 ], "k_image": "9373de8f4827db240b8b19f248bd9a13aaf464c363a2d508e2c3c7eba5c7f1b8" } } ], "vout": [ { "amount": 60000000000, "target": { "key": "0bbd20c4f6a0874d2384130e83c48240e48c488cca5d39d74cdce6ecfc05dcb2" } }, { "amount": 300000000000, "target": { "key": "279e8a3cb98134959257e037a7bbdf4571ddd42db0de8d6291fbc6fe5293787e" } }, { "amount": 600000000000, "target": { "key": "05e06398bcc8df281edde9aa33d9dfa123e167d7c2a0c07580b972fa51578cb7" } }, { "amount": 1000000000000, "target": { "key": "f2f39edba14a96e58c4d167c1d8c5366ec2e4a2b072b7f255609dd01482e3b18" } }, { "amount": 2000000000000, "target": { "key": "10e8ad0346720d96a1ff86e61bce73c6db3195487e6dc09f456778ca0d9dd566" } } ], "extra": [ 1, 136, 22, 246, 161, 26, 33, 183, 43, 140, 104, 178, 60, 77, 189, 29, 10, 167, 106, 149, 198, 209, 18, 161, 52, 255, 173, 247, 182, 77, 104, 78, 35, 222, 32, 4, 42, 145, 227, 43, 109, 255, 198, 43, 40, 71, 54, 153, 123, 66, 184, 224, 122, 183, 5, 128, 229, 196, 212, 231, 12, 121, 74, 203, 95, 69, 204 ], "signatures": [ "97452239d624459189656bde977c9a6ae34c5b5d201fa6645e74715f3619c7001d7c156f72387e40b835c8096e3e18fa86f63a955c857105a2c45fe39800a1078e29c7862d36106bf8467ac48ce100e6f79dadb8c3beceac2e3a3e1471c6950f6ba7ecbff1a1e81205d266035e77a83e025a42fc2ce153548b915f58354aa0059edca8155ebff7069b22956ac039695c4747056d4e4c376f313e6b499aa06f06424dea3ec2a9182295675ac205963e35b51e27fc3d535722abd395ff8a793e0c", "1e19c4de83362005b8be77711d71e478300c38cc495c5775650fe0df203a3b0caceecb90854374c108ea611e0d5ab4e801385b0a37bd1f7f2f7413d9d9872a080224d39ca2b8f9813b2be54d52bbbdd6c2ec7987435180bed5b0f0cad8fdd1069329f264d0ce6cf5f49a07e652e7b75759a02b5bb94c8a520a2ae24f38fab7051822bf22e7148303976a10250d65621cdc63067b107ed21a34eee404b3b3570398d56c8217a4739785d46264b686b4ed9036cfb0f2b1661bd02a01d5e4134909"] }


Less details
source code | moneroexplorer