Monero Transaction cafb1bb922ed852d4fb188b753ff89d45a59e47c00d54046fc265cce5a1ade6d

Autorefresh is OFF

Tx hash: cafb1bb922ed852d4fb188b753ff89d45a59e47c00d54046fc265cce5a1ade6d

Tx prefix hash: a699d55b294dfa804492b5136e99cf098a506302c22a57991a7420b772f6b51a
Tx public key: c40d0e4ba08d1d528ff1c2571942c8f451844948900f0fdb7cea0dc7d9503461

Transaction cafb1bb922ed852d4fb188b753ff89d45a59e47c00d54046fc265cce5a1ade6d was carried out on the Monero network on 2015-05-13 01:11:26. The transaction has 2734407 confirmations. Total output fee is 0.017763858349 XMR.

Timestamp: 1431479486 Timestamp [UTC]: 2015-05-13 01:11:26 Age [y:d:h:m:s]: 09:208:08:53:29
Block: 561151 Fee (per_kB): 0.017763858349 (0.026097834935) Tx size: 0.6807 kB
Tx version: 1 No of confirmations: 2734407 RingCT/type: no
Extra: 01c40d0e4ba08d1d528ff1c2571942c8f451844948900f0fdb7cea0dc7d9503461

6 output(s) for total of 10.670987000000 xmr

stealth address amount amount idx tag
00: 70abbdace282dfc56bc0475abb93c0f111e585e3430c6622aa960f6ea858d040 0.000987000000 20 of 48 -
01: 47ca11c32f84d048d7492356cda1631bd7a3c6b23998e66772e8d72a15537b89 0.030000000000 199626 of 324336 -
02: 9f640834181844a0d4d00d7616e022dd57e9e88d89644dc3d2bfdefcbb3dbc32 0.040000000000 169844 of 294095 -
03: 3b8b75ef4768afb03bb090a2678d39bc7f489a36662a59a7c35945cc1789c4e0 0.300000000000 550479 of 976536 -
04: e851c4d215b4e30154cc825be8f371eea62ebd80eba3f599bb5603e166408125 0.300000000000 550480 of 976536 -
05: 535d17bd09a109caa642b1769ebf97dc3e518534127c459878cc7f9fca12c129 10.000000000000 641672 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-05-08 21:52:46 till 2015-05-12 07:49:10; resolution: 0.02 days)

  • |_______________________*__________________________________________________________________________________________________________________________________________________|
  • |_______________________________________________________________________________________________________________________________________________________________________*__|
  • |_____________*____________________________________________________________________________________________________________________________________________________________|
  • |___*______________________________________________________________________________________________________________________________________________________________________|

4 inputs(s) for total of 10.688750858349 xmr

key image 00: 50ec96b5a2d4b0e038cc260078cd54f535f37b0725ae1944846a733e49efa9cf amount: 0.008750858349
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8052d0cf7a60e85acc8a2cc2426bd27cffb2bbdf320cca475b0d7d56694ca4ec 00555975 0 0/4 2015-05-09 08:58:03 09:212:01:06:52
key image 01: 0402cb2e2295ee882e47ef6c7d89ef2dc2b7ff3cd15bb786835cf2e00156fccf amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d2f216e5a7da3d073c169c6c925b9f2d2dc072735227acbef1790c147793c2fb 00560088 0 0/3 2015-05-12 06:49:10 09:209:03:15:45
key image 02: a432ca3036c9a4029022e6fff8c88dcd63e1a12a939ea2c0b9d262f8421a7bbc amount: 0.080000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9b8dc0c4c6dc4da23d1a8280a891c29e817253d1141bd876b87b78af804743ee 00555642 0 0/4 2015-05-09 03:54:20 09:212:06:10:35
key image 03: 979b28ac792f6dec33cb1f78378dad835b341991450f3c30359230ce08e88fbe amount: 0.600000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 37788e3f5735d3ae0bbcf2bedb80cc00e680993488086d16899e95a147ac16b7 00555346 1 3/7 2015-05-08 22:52:46 09:212:11:12:09
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 8750858349, "key_offsets": [ 0 ], "k_image": "50ec96b5a2d4b0e038cc260078cd54f535f37b0725ae1944846a733e49efa9cf" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 640483 ], "k_image": "0402cb2e2295ee882e47ef6c7d89ef2dc2b7ff3cd15bb786835cf2e00156fccf" } }, { "key": { "amount": 80000000000, "key_offsets": [ 132684 ], "k_image": "a432ca3036c9a4029022e6fff8c88dcd63e1a12a939ea2c0b9d262f8421a7bbc" } }, { "key": { "amount": 600000000000, "key_offsets": [ 425364 ], "k_image": "979b28ac792f6dec33cb1f78378dad835b341991450f3c30359230ce08e88fbe" } } ], "vout": [ { "amount": 987000000, "target": { "key": "70abbdace282dfc56bc0475abb93c0f111e585e3430c6622aa960f6ea858d040" } }, { "amount": 30000000000, "target": { "key": "47ca11c32f84d048d7492356cda1631bd7a3c6b23998e66772e8d72a15537b89" } }, { "amount": 40000000000, "target": { "key": "9f640834181844a0d4d00d7616e022dd57e9e88d89644dc3d2bfdefcbb3dbc32" } }, { "amount": 300000000000, "target": { "key": "3b8b75ef4768afb03bb090a2678d39bc7f489a36662a59a7c35945cc1789c4e0" } }, { "amount": 300000000000, "target": { "key": "e851c4d215b4e30154cc825be8f371eea62ebd80eba3f599bb5603e166408125" } }, { "amount": 10000000000000, "target": { "key": "535d17bd09a109caa642b1769ebf97dc3e518534127c459878cc7f9fca12c129" } } ], "extra": [ 1, 196, 13, 14, 75, 160, 141, 29, 82, 143, 241, 194, 87, 25, 66, 200, 244, 81, 132, 73, 72, 144, 15, 15, 219, 124, 234, 13, 199, 217, 80, 52, 97 ], "signatures": [ "8e31b032439e0b4a0c0032e26b9f65a4d43babce112458069191b62707c6520706590a606a3f695bbb9cf98caa13575404f103190efd1e2dbd6ee0e621bdb900", "c4e2bd5b7acb3436262811531f79e7394a08515c42aeb4a6a95bf60b72d20908b7d15eccd243182c44ef70c8d663ec0afe23a528d0899aad804cf708427a450d", "1d4a5742823b07117d2249f658b2d6cc847339e7d85437d8dbf66d9b12a1f9046f7edf329d5b848fb9b9dbc2763557b198319a68fe0f6287d27e9b48a7156400", "200f30689a5279208e06c88f7ab6ddff1a602cf04fee1d08c56b1b8295853f02ea0241c3d878c141d4810129c45e3c74788dffb46fa4401b65319e52d3df520a"] }


Less details
source code | moneroexplorer