Monero Transaction afbf0f2d9d27fdff4ebee217e36e2f99dba633ae9d7e1956ea992c2fb55ca25c

Autorefresh is OFF

Tx hash: afbf0f2d9d27fdff4ebee217e36e2f99dba633ae9d7e1956ea992c2fb55ca25c

Tx prefix hash: 22fd5e7a0161618b328c44d1248a95bca0d5db8b075468f6f7129321c22c95b0
Tx public key: 8f09cd977a55fbb1deb113ae3e143797a7e66449e32a8b9d07047c0c4aa4f802
Payment id: 9af2251067789c0508f0a61a4975d1103f5e6aeaca9b3f4e9404d0446a8a8752

Transaction afbf0f2d9d27fdff4ebee217e36e2f99dba633ae9d7e1956ea992c2fb55ca25c was carried out on the Monero network on 2014-08-24 16:47:16. The transaction has 3099725 confirmations. Total output fee is 0.005860969619 XMR.

Timestamp: 1408898836 Timestamp [UTC]: 2014-08-24 16:47:16 Age [y:d:h:m:s]: 10:093:10:26:53
Block: 187671 Fee (per_kB): 0.005860969619 (0.009618001426) Tx size: 0.6094 kB
Tx version: 1 No of confirmations: 3099725 RingCT/type: no
Extra: 0221009af2251067789c0508f0a61a4975d1103f5e6aeaca9b3f4e9404d0446a8a8752018f09cd977a55fbb1deb113ae3e143797a7e66449e32a8b9d07047c0c4aa4f802

6 output(s) for total of 1.071139030381 xmr

stealth address amount amount idx tag
00: ac521cdce9ce4aad9d7de1a5365315f0aa92052ff7fa4c88cde84d9b1dadc1e1 0.002139030381 0 of 1 -
01: ad8702fd51cf39de67636c8cbd1c17ba7118ebd6b90ce0a0a9973a153bef03ae 0.009000000000 167114 of 233398 -
02: 2b1424394dae686fe122fcaed7438972787deef0b7f718c938d82e3896b0298e 0.020000000000 223375 of 381492 -
03: dba52e1468dd064b0b724652be81709e5cf0292012d0bb646581d120e9cad43d 0.040000000000 141019 of 294095 -
04: aa5543c2ac98e7f3cbe235b096b14175af1fa26d63734e5517d24aea744450d6 0.300000000000 180865 of 976536 -
05: 84a50dbd51fa72452c192feb9d8c4b1c6a2cc48826277b88c6016c2c6ba1cd84 0.700000000000 122181 of 514467 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-08-24 03:25:18 till 2014-08-24 13:47:08; resolution: 0.00 days)

  • |___________________________________________________________________________________*______________________________________________________________________________________|
  • |_________________*________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________*________________|

3 inputs(s) for total of 1.077000000000 xmr

key image 00: 2f0b250c8017a2a6925c74edfb3acf4c47c0e9832bd1770cef7e7ac82bdc7e7c amount: 0.070000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f2790e4798d1a1112055d85303dfd61152952656917f0331de0bb4cf56162f89 00187129 1 3/5 2014-08-24 08:29:01 10:093:18:45:08
key image 01: f99ba29ecd0568eab8ce3d6e98a75f8a54d62e87afe02697940bbb2431e3bf37 amount: 0.007000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 94a63a48f3453754107e38c0ba21ed77a57abcb872e45c22141decbe3b8a6d6f 00186839 1 14/10 2014-08-24 04:25:18 10:093:22:48:51
key image 02: 145f2b782f0b5050780b74acd278a30f2e12cefc5dd386a9ed876bd3f649ed54 amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: bc879dc9f45c8516690bee15e53c07be15070dcc226038ff1e2ad521b8674f63 00187416 1 1/8 2014-08-24 12:47:08 10:093:14:27:01
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 70000000000, "key_offsets": [ 102399 ], "k_image": "2f0b250c8017a2a6925c74edfb3acf4c47c0e9832bd1770cef7e7ac82bdc7e7c" } }, { "key": { "amount": 7000000000, "key_offsets": [ 179665 ], "k_image": "f99ba29ecd0568eab8ce3d6e98a75f8a54d62e87afe02697940bbb2431e3bf37" } }, { "key": { "amount": 1000000000000, "key_offsets": [ 214160 ], "k_image": "145f2b782f0b5050780b74acd278a30f2e12cefc5dd386a9ed876bd3f649ed54" } } ], "vout": [ { "amount": 2139030381, "target": { "key": "ac521cdce9ce4aad9d7de1a5365315f0aa92052ff7fa4c88cde84d9b1dadc1e1" } }, { "amount": 9000000000, "target": { "key": "ad8702fd51cf39de67636c8cbd1c17ba7118ebd6b90ce0a0a9973a153bef03ae" } }, { "amount": 20000000000, "target": { "key": "2b1424394dae686fe122fcaed7438972787deef0b7f718c938d82e3896b0298e" } }, { "amount": 40000000000, "target": { "key": "dba52e1468dd064b0b724652be81709e5cf0292012d0bb646581d120e9cad43d" } }, { "amount": 300000000000, "target": { "key": "aa5543c2ac98e7f3cbe235b096b14175af1fa26d63734e5517d24aea744450d6" } }, { "amount": 700000000000, "target": { "key": "84a50dbd51fa72452c192feb9d8c4b1c6a2cc48826277b88c6016c2c6ba1cd84" } } ], "extra": [ 2, 33, 0, 154, 242, 37, 16, 103, 120, 156, 5, 8, 240, 166, 26, 73, 117, 209, 16, 63, 94, 106, 234, 202, 155, 63, 78, 148, 4, 208, 68, 106, 138, 135, 82, 1, 143, 9, 205, 151, 122, 85, 251, 177, 222, 177, 19, 174, 62, 20, 55, 151, 167, 230, 100, 73, 227, 42, 139, 157, 7, 4, 124, 12, 74, 164, 248, 2 ], "signatures": [ "ab296ba034910d2d840bd898f96395b6467806e42bea74adfb8c0592411bec03a5117d88366ca5a0ac72426cc0eea5e999a924ac1e24db12671865a66172ae07", "8c9466416934b2f73a2798b1a73893a06a29279b7ecdfae3414837bd4f64bb0099e40c90c30fff9a9b4991860c76f092dc618f9f018f05be1d7521a788efea0c", "c2bacfafd09c44e4943496843477acb57f3907c74fe4114ee4c35c0d47d37a03185573941a4dd3c8ca3bd91b31c68a2febb04801bb1e8a342b7807a6d1d38805"] }


Less details
source code | moneroexplorer