Monero Transaction b2fa52edc0669bd3276d5246bbcb3706059ee809b63d0b2c09d47cea95225624

Autorefresh is OFF

Tx hash: b2fa52edc0669bd3276d5246bbcb3706059ee809b63d0b2c09d47cea95225624

Tx prefix hash: 42f4ffa7eedde2ab7387f8dab71f6892bbc457dc908d0f871ae00f1c7e8d676b
Tx public key: 013fa0f396446b2d3db1322a216a879f52196d09b2ee02eeb5465fc0c7221988
Payment id: d1d5cde73f8e3e7d906a5b5150e50aaafa39f1e0dece607d7c25025c26d9ca92

Transaction b2fa52edc0669bd3276d5246bbcb3706059ee809b63d0b2c09d47cea95225624 was carried out on the Monero network on 2014-07-28 00:55:21. The transaction has 3157873 confirmations. Total output fee is 0.005031674464 XMR.

Timestamp: 1406508921 Timestamp [UTC]: 2014-07-28 00:55:21 Age [y:d:h:m:s]: 10:146:13:49:12
Block: 147848 Fee (per_kB): 0.005031674464 (0.006432502686) Tx size: 0.7822 kB
Tx version: 1 No of confirmations: 3157873 RingCT/type: no
Extra: 022100d1d5cde73f8e3e7d906a5b5150e50aaafa39f1e0dece607d7c25025c26d9ca9201013fa0f396446b2d3db1322a216a879f52196d09b2ee02eeb5465fc0c7221988

5 output(s) for total of 15.329000000000 xmr

stealth address amount amount idx tag
00: 4aaa7aa8917e1c132dc8a370fb9436a28fe11351fc0a42b943e2b0c4f4935b87 0.009000000000 153554 of 233398 -
01: a024cf8402c7383185381d869d75bd5bc563aff769a4caf20c249a31250ed46f 0.020000000000 204681 of 381492 -
02: acece3bd293f35f32ec107e7e85eb355f9f7b2d74eae8abe7dd3ddef298448b1 0.300000000000 128414 of 976536 -
03: c693bd7c3f4150b0ab104585ef55972e5601310434e71feec8d1cba264eac9f3 5.000000000000 75558 of 255089 -
04: aeb26cd8613c31fc0849a37820953ac8fd038bfeef4bb5c447ca3c28891927c1 10.000000000000 168957 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-27 20:06:27 till 2014-07-27 22:06:27; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|

5 inputs(s) for total of 15.334031674464 xmr

key image 00: fa6ef0d9cdce7770a32bcc22babc4a219be013f370dee0c48c7a704d8a5889ba amount: 0.004031674464
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 805b7ccf01c2cfa027c91cd7f5619957a3e5a97fc4b1b410b12483dc621c2d2d 00147620 0 0/5 2014-07-27 21:06:27 10:146:17:38:06
key image 01: ab51e0aa7191355c12cc280c105396a07d29a6f2376192fd9cced16c398602c9 amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 65e9e94e82f4de7113de88bb6551d4fe17af42372e040d88ffdb7a3189c659ad 00147620 0 0/5 2014-07-27 21:06:27 10:146:17:38:06
key image 02: 0fb89b47633a7812b266a5899c4114fd9287f9134a32b74ac8194a5eedc690aa amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8c1909cacdf4df7a178e1bc75ce25df207414e1c06fc0ee0b8c45cbc0921d8c5 00147620 0 0/5 2014-07-27 21:06:27 10:146:17:38:06
key image 03: 8c632fc372bbffd5169935d7407baa3c0f3b45e7ed2e7dde22a908d9e8fc49d0 amount: 0.030000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4b567ad65c773807f1853b686d397e0d3e9de4be25306f4f74aee55698632fb3 00147620 0 0/5 2014-07-27 21:06:27 10:146:17:38:06
key image 04: 2f201bbd060381264941e6096283083a7e286ff08a1b4aa9f32c4023a72c83bd amount: 0.300000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ad8096dc800d63d3436647976c3488f2141b0e93b1688604750038f59f2e647f 00147620 0 0/5 2014-07-27 21:06:27 10:146:17:38:06
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 4031674464, "key_offsets": [ 0 ], "k_image": "fa6ef0d9cdce7770a32bcc22babc4a219be013f370dee0c48c7a704d8a5889ba" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 75282 ], "k_image": "ab51e0aa7191355c12cc280c105396a07d29a6f2376192fd9cced16c398602c9" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 168680 ], "k_image": "0fb89b47633a7812b266a5899c4114fd9287f9134a32b74ac8194a5eedc690aa" } }, { "key": { "amount": 30000000000, "key_offsets": [ 153349 ], "k_image": "8c632fc372bbffd5169935d7407baa3c0f3b45e7ed2e7dde22a908d9e8fc49d0" } }, { "key": { "amount": 300000000000, "key_offsets": [ 127884 ], "k_image": "2f201bbd060381264941e6096283083a7e286ff08a1b4aa9f32c4023a72c83bd" } } ], "vout": [ { "amount": 9000000000, "target": { "key": "4aaa7aa8917e1c132dc8a370fb9436a28fe11351fc0a42b943e2b0c4f4935b87" } }, { "amount": 20000000000, "target": { "key": "a024cf8402c7383185381d869d75bd5bc563aff769a4caf20c249a31250ed46f" } }, { "amount": 300000000000, "target": { "key": "acece3bd293f35f32ec107e7e85eb355f9f7b2d74eae8abe7dd3ddef298448b1" } }, { "amount": 5000000000000, "target": { "key": "c693bd7c3f4150b0ab104585ef55972e5601310434e71feec8d1cba264eac9f3" } }, { "amount": 10000000000000, "target": { "key": "aeb26cd8613c31fc0849a37820953ac8fd038bfeef4bb5c447ca3c28891927c1" } } ], "extra": [ 2, 33, 0, 209, 213, 205, 231, 63, 142, 62, 125, 144, 106, 91, 81, 80, 229, 10, 170, 250, 57, 241, 224, 222, 206, 96, 125, 124, 37, 2, 92, 38, 217, 202, 146, 1, 1, 63, 160, 243, 150, 68, 107, 45, 61, 177, 50, 42, 33, 106, 135, 159, 82, 25, 109, 9, 178, 238, 2, 238, 181, 70, 95, 192, 199, 34, 25, 136 ], "signatures": [ "24c9d9c95237b6b156ce93d6c1e6e61351ded05594571242bb2b5c97021e8c018b2844c96be8f79e27a3c13b1291bf2406ab3ad0c6c16db8744cf377f479f504", "72e482b28bc4ffc8c842df4ba6c926fd5264d08d2115137f138afde7314391018dc8fd5baa738ae36efedd95fc22e104a12c94ce76e4e4f959a22f8492cf7106", "da6dfeed96039e15f44538b7a75902502f41aa91108fe3d16f51ecfe5c99190a7733aaa88f672132219af9305a75844681f9d9ae9107d32b87671997a3534f0b", "bb37f5c075875b5993a13dc47f3771337500d6f39905d3498202b3d82887d9023e36348d4033bf6382e54678b3cf2d07d48bb75e1760f4e8dbace84ccf842504", "a23a6c45b497fdf858750a46abf58247d2f5da80490e5307dd6ae10d6dcf810cd848a2feddb67f3ded48d5db5462eaebc63658fdd74b6a84b60842872cf6b506"] }


Less details
source code | moneroexplorer