Monero Transaction b2aec456b90b0a8bc06fa4dde6c0e9a1bb640954b7983ef5dd529c814d3ace05

Autorefresh is OFF

Tx hash: b2aec456b90b0a8bc06fa4dde6c0e9a1bb640954b7983ef5dd529c814d3ace05

Tx prefix hash: 9b44fd929567013867b37ce28c026bcfb2f0bde710c0535162526efb7f7afa42
Tx public key: 9ffbda3f7f2ef5df793bcd6173f803160bdd0d8fddfd4fe0aa473d95d2f6bd94
Payment id: 432a74d9db6349139644d3f448aeedec6420c262f78b409e8deecf9648c0cd61

Transaction b2aec456b90b0a8bc06fa4dde6c0e9a1bb640954b7983ef5dd529c814d3ace05 was carried out on the Monero network on 2014-11-24 09:24:58. The transaction has 2988407 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1416821098 Timestamp [UTC]: 2014-11-24 09:24:58 Age [y:d:h:m:s]: 10:029:03:21:23
Block: 318661 Fee (per_kB): 0.100000000000 (0.314110429448) Tx size: 0.3184 kB
Tx version: 1 No of confirmations: 2988407 RingCT/type: no
Extra: 022100432a74d9db6349139644d3f448aeedec6420c262f78b409e8deecf9648c0cd61019ffbda3f7f2ef5df793bcd6173f803160bdd0d8fddfd4fe0aa473d95d2f6bd94

1 output(s) for total of 0.300000000000 xmr

stealth address amount amount idx tag
00: f5fd3ad5d981dd4e348092c645c9a109c67de304e6eeca42baab23e8ccdc9aaf 0.300000000000 347680 of 976536 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-11-23 10:21:07 till 2014-11-24 09:30:01; resolution: 0.01 days)

  • |__________________________________________________________________________________________________________________________________________________________________*_______|
  • |________*_________________________________________________________________________________________________________________________________________________________________|

2 inputs(s) for total of 0.400000000000 xmr

key image 00: ebd17450eda8d07d8e467249a689457c6d937bd94f84eb880a432c9f52656917 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 207854c56cf3a6ba4e37db5aca4e1dcd5e2a56b80ff2f918ec1a29387dd03434 00318590 1 3/63 2014-11-24 08:30:01 10:029:04:16:20
key image 01: ec299bd4c1d193f5e5afef2264c1c90c9eaf45d589202a04a8de3f925ed5442b amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a5292fd3357e546354cd2a6fa9e712935af3b2363f58eed690b409cba3133c33 00317394 1 3/50 2014-11-23 11:21:07 10:030:01:25:14
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 200000000000, "key_offsets": [ 637310 ], "k_image": "ebd17450eda8d07d8e467249a689457c6d937bd94f84eb880a432c9f52656917" } }, { "key": { "amount": 200000000000, "key_offsets": [ 635715 ], "k_image": "ec299bd4c1d193f5e5afef2264c1c90c9eaf45d589202a04a8de3f925ed5442b" } } ], "vout": [ { "amount": 300000000000, "target": { "key": "f5fd3ad5d981dd4e348092c645c9a109c67de304e6eeca42baab23e8ccdc9aaf" } } ], "extra": [ 2, 33, 0, 67, 42, 116, 217, 219, 99, 73, 19, 150, 68, 211, 244, 72, 174, 237, 236, 100, 32, 194, 98, 247, 139, 64, 158, 141, 238, 207, 150, 72, 192, 205, 97, 1, 159, 251, 218, 63, 127, 46, 245, 223, 121, 59, 205, 97, 115, 248, 3, 22, 11, 221, 13, 143, 221, 253, 79, 224, 170, 71, 61, 149, 210, 246, 189, 148 ], "signatures": [ "24c8a546373f2670e1f1a073a1ce779e56dda3bb7bcf712c406df01f4062a70f88f2b8c50d44582c4a3368e398dd1dbc88d4acff212539009e29a6d52d1d2c07", "3a12d38f0dfb1d11ad564e4f249ded40e61b1f80c9133db60db4accd3bfd630f73ef1a8c6d04c3f9bc151777cf25e4328337000c9090ffcebc5c32d1973c4d0a"] }


Less details
source code | moneroexplorer