Monero Transaction ca9de4086b8d73dd4ae7dd1e050bf6b9fa11ea66df7788757f771624c72e0ee4

Autorefresh is OFF

Tx hash: ca9de4086b8d73dd4ae7dd1e050bf6b9fa11ea66df7788757f771624c72e0ee4

Tx prefix hash: d7fc71988f3471ba2a2d9268c781cb1e5a287ddbe2072170d8e3c29515ddb1a6
Tx public key: e69facd9e547eff69504b95b23fa49ed50c9f8fb4f03770c9d0f2645d03f6e57

Transaction ca9de4086b8d73dd4ae7dd1e050bf6b9fa11ea66df7788757f771624c72e0ee4 was carried out on the Monero network on 2014-10-16 18:37:12. The transaction has 3050687 confirmations. Total output fee is 0.182346200000 XMR.

Timestamp: 1413484632 Timestamp [UTC]: 2014-10-16 18:37:12 Age [y:d:h:m:s]: 10:077:19:01:42
Block: 263633 Fee (per_kB): 0.182346200000 (0.266746441143) Tx size: 0.6836 kB
Tx version: 1 No of confirmations: 3050687 RingCT/type: no
Extra: 01e69facd9e547eff69504b95b23fa49ed50c9f8fb4f03770c9d0f2645d03f6e57

6 output(s) for total of 13.617733800000 xmr

stealth address amount amount idx tag
00: 14d1e47528105268779d4f84387025a82749195d0375b98b881b70bd1cc7aff6 0.017733800000 0 of 1 -
01: c994715e591435099ca871a37c3d20a0c2e72ac7611253f6ab62f56a00baeeab 0.300000000000 285719 of 976536 -
02: 664429ea6e7cc591e28d04e2929f710a07599c088a0671ac9305591acc13f9cf 0.300000000000 285720 of 976536 -
03: c6a01cc978685731f0b3c80f4eb2efe3801130b01a318eeec99ba511d437727b 1.000000000000 305351 of 874630 -
04: b1b7a04786be487eace064df6c40e578990cf84ef33facb45eb257c601a225d4 2.000000000000 117053 of 434058 -
05: 2344e770debedccdef5471ff6a183372d263df1a1280c511f52a263c7426b05a 10.000000000000 307019 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-26 04:49:28 till 2014-10-03 00:35:17; resolution: 0.76 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_______________________________________________________________________________________________________________________*__________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_______________________________________________________________________________________________________________________________________________________________________*__|

4 inputs(s) for total of 13.800080000000 xmr

key image 00: 5a0a31ac06dc35b2678bd4c7eba9309ad41517880fb46b7cb0f364133e725ebb amount: 0.000080000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: de064c7ab821ddd0a9c1cb1be3262337f4f1360e1434125967334ded74c6602c 00056921 1 7/174 2014-05-26 05:49:28 10:221:07:49:26
key image 01: 1764af15a59060980ebc34f138671ad7ca36987cdb8bc524c0d7eaf063693b93 amount: 7.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 22192a44550660a458da07354a4947c10a034035133db6dffcfb1121b65e27aa 00188373 1 6/6 2014-08-25 05:13:35 10:130:08:25:19
key image 02: 8f34950cc11b4dd8a8a488f6c53876fc12103b659072a4b0880a89da796ae57d amount: 0.800000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1d192c30855d4d2f31f423bb695790a3702d4a4b36e6e9602faede7719ebbb37 00243881 1 5/6 2014-10-02 23:35:17 10:091:14:03:37
key image 03: d36063cdf31f2ae5a7293b985bc992068167cad4e2d8d7d72d5310ce158a85b6 amount: 6.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: bcdbdcbb7c901b1f64f16b683e6f94f797051fe9f88b0a80625d88a387d6adb9 00241012 1 5/6 2014-09-30 22:19:57 10:093:15:18:57
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 80000000, "key_offsets": [ 17854 ], "k_image": "5a0a31ac06dc35b2678bd4c7eba9309ad41517880fb46b7cb0f364133e725ebb" } }, { "key": { "amount": 7000000000000, "key_offsets": [ 51772 ], "k_image": "1764af15a59060980ebc34f138671ad7ca36987cdb8bc524c0d7eaf063693b93" } }, { "key": { "amount": 800000000000, "key_offsets": [ 168268 ], "k_image": "8f34950cc11b4dd8a8a488f6c53876fc12103b659072a4b0880a89da796ae57d" } }, { "key": { "amount": 6000000000000, "key_offsets": [ 83410 ], "k_image": "d36063cdf31f2ae5a7293b985bc992068167cad4e2d8d7d72d5310ce158a85b6" } } ], "vout": [ { "amount": 17733800000, "target": { "key": "14d1e47528105268779d4f84387025a82749195d0375b98b881b70bd1cc7aff6" } }, { "amount": 300000000000, "target": { "key": "c994715e591435099ca871a37c3d20a0c2e72ac7611253f6ab62f56a00baeeab" } }, { "amount": 300000000000, "target": { "key": "664429ea6e7cc591e28d04e2929f710a07599c088a0671ac9305591acc13f9cf" } }, { "amount": 1000000000000, "target": { "key": "c6a01cc978685731f0b3c80f4eb2efe3801130b01a318eeec99ba511d437727b" } }, { "amount": 2000000000000, "target": { "key": "b1b7a04786be487eace064df6c40e578990cf84ef33facb45eb257c601a225d4" } }, { "amount": 10000000000000, "target": { "key": "2344e770debedccdef5471ff6a183372d263df1a1280c511f52a263c7426b05a" } } ], "extra": [ 1, 230, 159, 172, 217, 229, 71, 239, 246, 149, 4, 185, 91, 35, 250, 73, 237, 80, 201, 248, 251, 79, 3, 119, 12, 157, 15, 38, 69, 208, 63, 110, 87 ], "signatures": [ "d9f54335e881f0a8482fee0168491e8086611f8dcf1277b26f5518bf1524b101590fe522c8f9bc1cb7fb0181218360ea36af76af167e5668345b4792d5660e07", "19122885743e7079e2e775bb20d4ca14694c5cae463ffbd9c55faed8e36cd90ad19943bea8059b6b40b62228427d21cdbe8bcd6b3546a15d481d8a438976f90b", "d9031e645dd3eaf2285a274dc8ecce28b9b3bad54f43c12c4948d32b35100c057a5fecc19878a65aa120a39a73b1e05996460fe8eefe43426024bfec07dfeb09", "580da5d0d79bb71d99abf0f80cb6cf71cdfa0ab8008e40e71cca247d43538600575b84edbb5b9434dedaf481a39e89c1a6804eec16854805a0418ac09cc5d207"] }


Less details
source code | moneroexplorer