Monero Transaction b2c1ae5fc0e93461755a0f007885c49801980a43a6ac71d59f520e4415d552b0

Autorefresh is OFF

Tx hash: b2c1ae5fc0e93461755a0f007885c49801980a43a6ac71d59f520e4415d552b0

Tx prefix hash: 4997354dfc2eee415e7d2376c815ec1eca64a455c11f12f16f35c2211ca57388
Tx public key: b8fdf782004e7bd7fb618b3395c2bd0902c7df23cedf60871b50e782633df4f7
Payment id: 53d954b06dff0574c556fe4106c242b12929a9f71687a1194d3d6ddfdbaf2423

Transaction b2c1ae5fc0e93461755a0f007885c49801980a43a6ac71d59f520e4415d552b0 was carried out on the Monero network on 2014-06-29 19:08:23. The transaction has 3180608 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1404068903 Timestamp [UTC]: 2014-06-29 19:08:23 Age [y:d:h:m:s]: 10:149:20:12:49
Block: 107156 Fee (per_kB): 0.005000000000 (0.009326047359) Tx size: 0.5361 kB
Tx version: 1 No of confirmations: 3180608 RingCT/type: no
Extra: 02210053d954b06dff0574c556fe4106c242b12929a9f71687a1194d3d6ddfdbaf242301b8fdf782004e7bd7fb618b3395c2bd0902c7df23cedf60871b50e782633df4f7

4 output(s) for total of 1.495000000000 xmr

stealth address amount amount idx tag
00: 683a462c1f3a8efec41dd952c41ee701821f9bb9e4669a7b0c4a4c5bb5ab12d0 0.005000000000 179938 of 308585 -
01: 15ee5eb6e3a639cde8e58c307322fd79e10ea201f426523122f8f93b9d113950 0.090000000000 70409 of 317822 -
02: 2a5869ac60963bef1eaa5c32e5c0490812713d1f965105f362ee79b136de8f30 0.400000000000 54143 of 688584 -
03: a7998bb9f721efe22d238f8cd6e58a3590383d42dde855198f924310f2906133 1.000000000000 57671 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-27 18:44:26 till 2014-06-28 14:49:30; resolution: 0.00 days)

  • |_________________________________________________________________________________________________________________________________________________________________*________|
  • |_________*________________________________________________________________________________________________________________________________________________________________|
  • |__________________________________________________________________*_______________________________________________________________________________________________________|

3 inputs(s) for total of 1.500000000000 xmr

key image 00: 743cd9409ee744f358fd6aa7125e45c05387c9584aeb2f4d024030201170205d amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: afa17027bdf14032e7e0dca5645af2435de016624e0acfe5ce961e50b6eb6fad 00105365 1 6/31 2014-06-28 13:49:30 10:151:01:31:42
key image 01: 82a7811dc5ef899f877aa685a7d38135360ac6d56cc29e379f9d4d082c718c15 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 25e454a79892c8bca240e251efa76b26e3afadeb82db55e6e4ff2819596963aa 00104269 1 18/55 2014-06-27 19:44:26 10:151:19:36:46
key image 02: d595ee49d21c561f2139dde1ec301bd2678acd5618f6b1327e2378e72b76b9ff amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 611a0cbe09d386b8b90948cb1531778a02accd8646864cce4eae52d3ae36cdaf 00104682 1 22/61 2014-06-28 02:34:11 10:151:12:47:01
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 500000000000, "key_offsets": [ 68036 ], "k_image": "743cd9409ee744f358fd6aa7125e45c05387c9584aeb2f4d024030201170205d" } }, { "key": { "amount": 500000000000, "key_offsets": [ 64779 ], "k_image": "82a7811dc5ef899f877aa685a7d38135360ac6d56cc29e379f9d4d082c718c15" } }, { "key": { "amount": 500000000000, "key_offsets": [ 66325 ], "k_image": "d595ee49d21c561f2139dde1ec301bd2678acd5618f6b1327e2378e72b76b9ff" } } ], "vout": [ { "amount": 5000000000, "target": { "key": "683a462c1f3a8efec41dd952c41ee701821f9bb9e4669a7b0c4a4c5bb5ab12d0" } }, { "amount": 90000000000, "target": { "key": "15ee5eb6e3a639cde8e58c307322fd79e10ea201f426523122f8f93b9d113950" } }, { "amount": 400000000000, "target": { "key": "2a5869ac60963bef1eaa5c32e5c0490812713d1f965105f362ee79b136de8f30" } }, { "amount": 1000000000000, "target": { "key": "a7998bb9f721efe22d238f8cd6e58a3590383d42dde855198f924310f2906133" } } ], "extra": [ 2, 33, 0, 83, 217, 84, 176, 109, 255, 5, 116, 197, 86, 254, 65, 6, 194, 66, 177, 41, 41, 169, 247, 22, 135, 161, 25, 77, 61, 109, 223, 219, 175, 36, 35, 1, 184, 253, 247, 130, 0, 78, 123, 215, 251, 97, 139, 51, 149, 194, 189, 9, 2, 199, 223, 35, 206, 223, 96, 135, 27, 80, 231, 130, 99, 61, 244, 247 ], "signatures": [ "7258f665fafe2ba88bc73de6c0b17764fcd5b715e60b271896c45fc186f3d00563ed3c80a3fd71f3780f1128aff65d6a481d28ddf6d9e64b50d534cbcf26bd00", "bddcbf61eb8714a0c0d2c25138ae08223155e664de20abb9f1d3412ea9522c0b0fa6fcfdb17a9b985da49c2504f59a2a6e6d1baa3559068b9d4a63b5026a9307", "30fdf3e8eaa71ef15e165ae06a87cbec7d80f45d29437ed330082cd5cf270b047f758c6dbc122472cb14b42cbbef9e32635bee1b841c47f6efae42d227c8390f"] }


Less details
source code | moneroexplorer