Monero Transaction caf7f2fae9f9c449df655dbf8ed7db9683a65de28988cea4ba0ac19acb081585

Autorefresh is OFF

Tx hash: caf7f2fae9f9c449df655dbf8ed7db9683a65de28988cea4ba0ac19acb081585

Tx prefix hash: 04a9e36ed50bf0d76a1ee550f7b76fba7b8b2971b8f3190f029bc4cc99222cc7
Tx public key: 641584b005d48098b338387910c03bfc94359bdea2b34a69a0490536828436ea

Transaction caf7f2fae9f9c449df655dbf8ed7db9683a65de28988cea4ba0ac19acb081585 was carried out on the Monero network on 2014-06-26 22:03:23. The transaction has 3186633 confirmations. Total output fee is 0.018000000000 XMR.

Timestamp: 1403820203 Timestamp [UTC]: 2014-06-26 22:03:23 Age [y:d:h:m:s]: 10:155:08:03:50
Block: 102984 Fee (per_kB): 0.018000000000 (0.022783683560) Tx size: 0.7900 kB
Tx version: 1 No of confirmations: 3186633 RingCT/type: no
Extra: 01641584b005d48098b338387910c03bfc94359bdea2b34a69a0490536828436ea

6 output(s) for total of 20.060000000000 xmr

stealth address amount amount idx tag
00: f5a68916906668b9751e4604b3853d02433a60c71bd931ec01b1969b34bd1ca6 0.070000000000 77325 of 263947 -
01: caeb0c6ad8018a0739d22cffd3f66d9e9019fa3141c70b64cfcf130e7e5b0baa 0.090000000000 68746 of 317822 -
02: 2db718107fa4046160d279b55b881445d94e9abad34c3cb8f65280f51e6610f1 0.900000000000 31175 of 454894 -
03: bed37015a2cf1ea102a3efda5b2c1db624a19c67a17f5a72c4b292ff1cc0c328 1.000000000000 50134 of 874629 -
04: 5127121d581ebd2e7c90d9e8edf1984c8746c5b54fd77f1b132606c7179ed9e7 8.000000000000 6439 of 226902 -
05: 424255f3db7bf5456d53dc66299038a2eaad3184c230df77093b66780c01c7e2 10.000000000000 113074 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-29 20:52:42 till 2014-06-24 13:07:31; resolution: 0.15 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_______________________________________________________________________________________________________________________________________________________________________*__|
  • |_____________________________________________________________________________________________________________________________________________________________________*____|
  • |_______________________________________________________________________________________________________________________________________________________________________*__|
  • |_________________________________________________________________________________________________________________________________________________________________________*|

5 inputs(s) for total of 20.078000000000 xmr

key image 00: ce11e98a935d1d34404846dc72cc7fbdcc51980e70a7e2434a4dc05c08421bb6 amount: 0.008000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: aeda0f2cd15b25ec73cb7c2bb6be7d30daabff9265924904d1e826e4865a8cc5 00062247 1 13/15 2014-05-29 21:52:42 10:183:08:14:31
key image 01: 7849ef7abf314ca279d917daa903be00719b02bec9029454efe9143eaec2cf41 amount: 0.070000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7cad6746334e3483f046443109425439faad055ffa98a6f055d326ca469a9dec 00099071 1 56/6 2014-06-24 04:51:29 10:158:01:15:44
key image 02: 271c9fd9acb511b86da6b043aa3acaccb2f2c74a004a040494fa6cc9d30a8420 amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1490a6739f802d3873463674b8ca9b8e9ba4da3b89a90311da777e38750d05e7 00098566 1 13/8 2014-06-23 20:07:50 10:158:09:59:23
key image 03: 52dcee820df4f91b5a6cd136cb99759dd80b7f07a708580b02a1986d73fc63ac amount: 9.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 10184d6a4d43e316eeb1a352a2dbe0202ee82060c1b09775f9e820ea36e4c1c6 00098979 1 35/8 2014-06-24 03:17:04 10:158:02:50:09
key image 04: 9c53ff322a05dca5898e924ab6af058083e20a7c333a8474ec4ee15c70ea55b5 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f3eb124e34150a6d3d2e2d4b08ed571ba95dd34ec886368f7cbdd25f5aa3365f 00099514 1 14/3 2014-06-24 12:07:31 10:157:17:59:42
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 8000000000, "key_offsets": [ 25811 ], "k_image": "ce11e98a935d1d34404846dc72cc7fbdcc51980e70a7e2434a4dc05c08421bb6" } }, { "key": { "amount": 70000000000, "key_offsets": [ 76264 ], "k_image": "7849ef7abf314ca279d917daa903be00719b02bec9029454efe9143eaec2cf41" } }, { "key": { "amount": 1000000000000, "key_offsets": [ 41732 ], "k_image": "271c9fd9acb511b86da6b043aa3acaccb2f2c74a004a040494fa6cc9d30a8420" } }, { "key": { "amount": 9000000000000, "key_offsets": [ 7603 ], "k_image": "52dcee820df4f91b5a6cd136cb99759dd80b7f07a708580b02a1986d73fc63ac" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 108698 ], "k_image": "9c53ff322a05dca5898e924ab6af058083e20a7c333a8474ec4ee15c70ea55b5" } } ], "vout": [ { "amount": 70000000000, "target": { "key": "f5a68916906668b9751e4604b3853d02433a60c71bd931ec01b1969b34bd1ca6" } }, { "amount": 90000000000, "target": { "key": "caeb0c6ad8018a0739d22cffd3f66d9e9019fa3141c70b64cfcf130e7e5b0baa" } }, { "amount": 900000000000, "target": { "key": "2db718107fa4046160d279b55b881445d94e9abad34c3cb8f65280f51e6610f1" } }, { "amount": 1000000000000, "target": { "key": "bed37015a2cf1ea102a3efda5b2c1db624a19c67a17f5a72c4b292ff1cc0c328" } }, { "amount": 8000000000000, "target": { "key": "5127121d581ebd2e7c90d9e8edf1984c8746c5b54fd77f1b132606c7179ed9e7" } }, { "amount": 10000000000000, "target": { "key": "424255f3db7bf5456d53dc66299038a2eaad3184c230df77093b66780c01c7e2" } } ], "extra": [ 1, 100, 21, 132, 176, 5, 212, 128, 152, 179, 56, 56, 121, 16, 192, 59, 252, 148, 53, 155, 222, 162, 179, 74, 105, 160, 73, 5, 54, 130, 132, 54, 234 ], "signatures": [ "c7c45b2e06f0adfaba861e729510cb87d93f0f4afb0cad1d98808245348b6103617ebaa4ae0ba4d36d8ef351e1e8cfd502fbe6106deaeda771b05649ad6b0002", "fbf36b284c0f2c019d32526ac87cba15c0abba0580ee82a03fa3816bf0dee6027508b79c6c40d51f6ff2b1112dfe939447f391f88de725e06a6a539bffdc080f", "908f4d54c0ec1c4b4cba0e76497526cdfa09e9748f189cd4d6e700f1a3fc1d0533ad9f7e7d2bb12db0e0f452899bb2c9692f5abdca3cfda7366bd541061e2b04", "ae4c1c85d14edaec1371464c5abf682d839772bd767fac9eaa8aa6817546110f1e7cab1856a07bd85cc7ddd3b8451427dd1ab86774e296eed8cbdd95d57ece04", "95d533f8719d9477e21afdf96fe91b0677e029888b5a2505f299f9aa7402020230e795895f6891712c9573a48034841d5ea51f90804e5de4c566080a2e15c503"] }


Less details
source code | moneroexplorer