Monero Transaction c0dfb0f6f3c3e30c78aea59f74498d872341beea64d5bdf8000643d33b8a8edf

Autorefresh is OFF

Tx hash: c0dfb0f6f3c3e30c78aea59f74498d872341beea64d5bdf8000643d33b8a8edf

Tx prefix hash: af15da39c33f561e9ae5dc440703c51491e1c32768154f7694d1319d72f6b491
Tx public key: bea7c89ba8629e078bfd0edfe78c858e0fd361e5e7382559fee1b17d423b1182
Payment id: fcb14c4b70db10b0231d42aa5b557cad20c22a461c1571e5bfdac404717446a0

Transaction c0dfb0f6f3c3e30c78aea59f74498d872341beea64d5bdf8000643d33b8a8edf was carried out on the Monero network on 2014-08-11 20:47:32. The transaction has 3134091 confirmations. Total output fee is 0.009988502289 XMR.

Timestamp: 1407790052 Timestamp [UTC]: 2014-08-11 20:47:32 Age [y:d:h:m:s]: 10:128:09:17:53
Block: 169197 Fee (per_kB): 0.009988502289 (0.014759345374) Tx size: 0.6768 kB
Tx version: 1 No of confirmations: 3134091 RingCT/type: no
Extra: 022100fcb14c4b70db10b0231d42aa5b557cad20c22a461c1571e5bfdac404717446a001bea7c89ba8629e078bfd0edfe78c858e0fd361e5e7382559fee1b17d423b1182

5 output(s) for total of 1.170011497711 xmr

stealth address amount amount idx tag
00: 53d4e337baeb62b68e8bfd05b986adecc43ae956b18a980c1aca37b268a28e7f 0.000011497711 0 of 1 -
01: a51c864d9a7c5f22e7c2dcbebfff070de54a0649f430f0e7caa5499c4743b89f 0.010000000000 329760 of 502466 -
02: d0dafdde32666407e0cf09c08dc3fcc9bca6bbd2f8ba4513b514b0cd67cdbfa8 0.060000000000 104079 of 264760 -
03: 936de78f68022d993b30942c16b8ef0c8caa7181daaca56752276665a49b9975 0.400000000000 145622 of 688584 -
04: 46e8f80174760470c56884c20fe526cd7c82d84423fbc1d9df8f6e7b989d6ade 0.700000000000 104654 of 514467 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-08-10 15:48:00 till 2014-08-11 18:25:13; resolution: 0.01 days)

  • |____________________________________________________________________________________________________________________________________________*_____________________________|
  • |____________________________________________________________________________________________________________________*_____________________________________________________|
  • |___________________________________________________________________________________________________________________________________________________________________*______|
  • |_______*__________________________________________________________________________________________________________________________________________________________________|

4 inputs(s) for total of 1.180000000000 xmr

key image 00: ecf87987c0ab232bb1d19f97de5ea984f4b57039e7a210798f4113f4ac92e861 amount: 0.080000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 847051909379ada533815f9059aa272c975358e138b7d924c521a94c77a52326 00168788 1 2/7 2014-08-11 13:48:15 10:128:16:17:10
key image 01: 22c8ede2355006dc6b581922c3cf61945b469b1ecc650c092de4d8d9f9c39172 amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c10fb9a39b3a20c417a0f4ef318ce3cad9e5cef052c1da6d9cb325ce31453524 00168534 1 1/6 2014-08-11 09:57:38 10:128:20:07:47
key image 02: f423794ab7b45d6a9fb9811e37cde311aa86485b67577222fd39a929a32940ad amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8658c02e700dc6cdffb141eb67d27721bd56e8d69a861accd1cf2524b5fd908d 00169006 1 4/4 2014-08-11 17:25:13 10:128:12:40:12
key image 03: 4fe3d4747365439fc3830df5d87a85e7017891ab0e72042e81a3920eadc7c0e3 amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b62af2e2a2ac442b4df70b159465e21a55ab4eb2fd55a173837bbd4ec16d69de 00167482 1 1/6 2014-08-10 16:48:00 10:129:13:17:25
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 80000000000, "key_offsets": [ 90630 ], "k_image": "ecf87987c0ab232bb1d19f97de5ea984f4b57039e7a210798f4113f4ac92e861" } }, { "key": { "amount": 100000000000, "key_offsets": [ 405664 ], "k_image": "22c8ede2355006dc6b581922c3cf61945b469b1ecc650c092de4d8d9f9c39172" } }, { "key": { "amount": 100000000000, "key_offsets": [ 406998 ], "k_image": "f423794ab7b45d6a9fb9811e37cde311aa86485b67577222fd39a929a32940ad" } }, { "key": { "amount": 900000000000, "key_offsets": [ 81980 ], "k_image": "4fe3d4747365439fc3830df5d87a85e7017891ab0e72042e81a3920eadc7c0e3" } } ], "vout": [ { "amount": 11497711, "target": { "key": "53d4e337baeb62b68e8bfd05b986adecc43ae956b18a980c1aca37b268a28e7f" } }, { "amount": 10000000000, "target": { "key": "a51c864d9a7c5f22e7c2dcbebfff070de54a0649f430f0e7caa5499c4743b89f" } }, { "amount": 60000000000, "target": { "key": "d0dafdde32666407e0cf09c08dc3fcc9bca6bbd2f8ba4513b514b0cd67cdbfa8" } }, { "amount": 400000000000, "target": { "key": "936de78f68022d993b30942c16b8ef0c8caa7181daaca56752276665a49b9975" } }, { "amount": 700000000000, "target": { "key": "46e8f80174760470c56884c20fe526cd7c82d84423fbc1d9df8f6e7b989d6ade" } } ], "extra": [ 2, 33, 0, 252, 177, 76, 75, 112, 219, 16, 176, 35, 29, 66, 170, 91, 85, 124, 173, 32, 194, 42, 70, 28, 21, 113, 229, 191, 218, 196, 4, 113, 116, 70, 160, 1, 190, 167, 200, 155, 168, 98, 158, 7, 139, 253, 14, 223, 231, 140, 133, 142, 15, 211, 97, 229, 231, 56, 37, 89, 254, 225, 177, 125, 66, 59, 17, 130 ], "signatures": [ "01e90d897b90480ab0564e2669dfa967d1a184c0d906692512511cd3d512c10e91ac1547f18c7fd16aa98ca30130f2e3a9e835eed545425832769effc6c0d302", "d20b1189f9c0db2fb69e2616b01d50e41545cc8bd471e00d1539496269fe750b487b783d009bd1bab6ab1c5629d65eb9cfaabab6f3f0d30425d06b3b96ffa10c", "5974c79bb2a812fb2b4a28cd243547060a4cbc2b4087a394690c58e6fe51c609865d9a367626329c0d5f21171d5e64b7dfe87d99440f2b0697b5207ebbd16109", "ebb1ac32ad66a78be60994c4fdf4c01f019b8ec195a8fdd52f893269dc9ea9027d9b2b0353e0c3e5c6623e2cf32481d69ac05bd030fd340b3ff713a51b5fa40f"] }


Less details
source code | moneroexplorer