Monero Transaction b2a1e691efca93a388b6ba263fa35c3760de231f0f0fa25c18b01dd070cc9953

Autorefresh is OFF

Tx hash: b2a1e691efca93a388b6ba263fa35c3760de231f0f0fa25c18b01dd070cc9953

Tx prefix hash: eeea1a2eb1c81a2e942dd6a9eeac12dbf3491f8e6d5f4ef0673436f0845aac66
Tx public key: a2a7efdbaea675c083f1ebd6bcae789ff9dca8c2f105cc39fc88c177db70b921
Payment id: 3019ea812ae80a92969c6d91d2da49e6450f3a81fd16302e1608eb9f0abddf49

Transaction b2a1e691efca93a388b6ba263fa35c3760de231f0f0fa25c18b01dd070cc9953 was carried out on the Monero network on 2014-11-28 18:50:41. The transaction has 2970463 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1417200641 Timestamp [UTC]: 2014-11-28 18:50:41 Age [y:d:h:m:s]: 10:008:11:34:26
Block: 324982 Fee (per_kB): 0.100000000000 (0.165695792880) Tx size: 0.6035 kB
Tx version: 1 No of confirmations: 2970463 RingCT/type: no
Extra: 0221003019ea812ae80a92969c6d91d2da49e6450f3a81fd16302e1608eb9f0abddf4901a2a7efdbaea675c083f1ebd6bcae789ff9dca8c2f105cc39fc88c177db70b921

5 output(s) for total of 1003.900000000000 xmr

stealth address amount amount idx tag
00: a84f90a9b6c5acb32681f957bd1bb6a130eba6751b241df0c468f069a7c9322f 0.900000000000 169964 of 454894 -
01: 612281b868add0a2067aa70e43fd680de4cacaa7be519ea464c58aa7ff0fd008 4.000000000000 134222 of 237197 -
02: 186ded498260af80ad6f3fc777e3e9e01d5cee5a3bebda5388f0cec7f296fd7a 9.000000000000 27547 of 274259 -
03: 30bf9d5f11fa3941aba4f4262885a2277ae5905919b8180cc73ebf1afd628c8a 90.000000000000 6565 of 36286 -
04: 9477979e41b502b752e3ee15e6999b4855f6e20148113f7fe25b9f44452cb738 900.000000000000 784 of 8187 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-27 03:36:06 till 2014-09-16 23:27:44; resolution: 0.66 days)

  • |_*______________________________________________________________________________________________________________________________________________________________*_________|
  • |________________________________________________________________________________________________________________________________________________________________*________*|

2 inputs(s) for total of 1004.000000000000 xmr

key image 00: 82275dd124961779c6fc20dba53ad0c07915ae92e5bf611ba0e8e01fc72eca79 amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 186fc48019d8774416a1a6c68ff3dff2184c0b8c473b3fb7f9f66d00581f8ead 00058327 1 17/84 2014-05-27 04:36:06 10:194:01:49:01
- 01: a958cfef9328336d503d0469dd552200afac0b7a1960a1b09da89779de0f82db 00212152 1 120/10 2014-09-10 19:16:12 10:087:11:08:55
key image 01: 15d0f239e1c9d4ca1571fcf296bc6308a2800ec159ec6a717f686aede749d261 amount: 1000.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: edf32b2a38df7114b29ef0361ce2732df32462adb9f0dcf655c41ed85cdabafd 00212152 1 120/10 2014-09-10 19:16:12 10:087:11:08:55
- 01: 81f502df471339db4949f0228287ee0e65918731b539833db16e9c2b2543f1c4 00220953 1 55/9 2014-09-16 22:27:44 10:081:07:57:23
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 4000000000000, "key_offsets": [ 1686, 83949 ], "k_image": "82275dd124961779c6fc20dba53ad0c07915ae92e5bf611ba0e8e01fc72eca79" } }, { "key": { "amount": 1000000000000000, "key_offsets": [ 841, 43 ], "k_image": "15d0f239e1c9d4ca1571fcf296bc6308a2800ec159ec6a717f686aede749d261" } } ], "vout": [ { "amount": 900000000000, "target": { "key": "a84f90a9b6c5acb32681f957bd1bb6a130eba6751b241df0c468f069a7c9322f" } }, { "amount": 4000000000000, "target": { "key": "612281b868add0a2067aa70e43fd680de4cacaa7be519ea464c58aa7ff0fd008" } }, { "amount": 9000000000000, "target": { "key": "186ded498260af80ad6f3fc777e3e9e01d5cee5a3bebda5388f0cec7f296fd7a" } }, { "amount": 90000000000000, "target": { "key": "30bf9d5f11fa3941aba4f4262885a2277ae5905919b8180cc73ebf1afd628c8a" } }, { "amount": 900000000000000, "target": { "key": "9477979e41b502b752e3ee15e6999b4855f6e20148113f7fe25b9f44452cb738" } } ], "extra": [ 2, 33, 0, 48, 25, 234, 129, 42, 232, 10, 146, 150, 156, 109, 145, 210, 218, 73, 230, 69, 15, 58, 129, 253, 22, 48, 46, 22, 8, 235, 159, 10, 189, 223, 73, 1, 162, 167, 239, 219, 174, 166, 117, 192, 131, 241, 235, 214, 188, 174, 120, 159, 249, 220, 168, 194, 241, 5, 204, 57, 252, 136, 193, 119, 219, 112, 185, 33 ], "signatures": [ "058f0ce872dcee98c7e4f4138654deb35ff85db78eba549d43a6ae0dd65ad809db044700330d467319ad33ad72190f8dace2ea8a27208c8d6e0151c2978f8f016b9db2731736741d1de11340f697f116dc64402164efd3516b4689d5afb01e04cf6e9ff381c2062e90f7f7a06344b6d9ce575007e54b44d7d85b13573f39dd05", "3b112ca1a1bfab409efbc753b66a6748f1fce6c386dfc9b9cbcec459c1077a0f4e8944a653a0f3c6a0d0289ff9585ade5f05230235c07a677a4485c69c77be088984cfef32b0274d028f84ab73e4075a6120a87309e15ea70b47a1830206d203b37877db1e8e31f04281e1bcef3bc1ac389e0b70e8076d62f172769fd781e607"] }


Less details
source code | moneroexplorer