Monero Transaction cdfba0febf244c1ad15c3c153dea74259f3f85d8b99072f0ff668c1f36e33db0

Autorefresh is OFF

Tx hash: cdfba0febf244c1ad15c3c153dea74259f3f85d8b99072f0ff668c1f36e33db0

Tx prefix hash: faec2ddd10f5bae46ce49aecf4a3b1e1c9860c98375184d04387d7183970690d
Tx public key: bbb4b252eacb7b3a3e53b0b19b78d274b2284de7f4c14f2e51508021f65a6007
Payment id: b64353e41e49037b1589b04ec186e426534f8bd6b95053e94a7b3a1c60a694a5

Transaction cdfba0febf244c1ad15c3c153dea74259f3f85d8b99072f0ff668c1f36e33db0 was carried out on the Monero network on 2014-10-26 07:29:47. The transaction has 3035327 confirmations. Total output fee is 0.174561386414 XMR.

Timestamp: 1414308587 Timestamp [UTC]: 2014-10-26 07:29:47 Age [y:d:h:m:s]: 10:065:17:56:28
Block: 277208 Fee (per_kB): 0.174561386414 (0.326187700160) Tx size: 0.5352 kB
Tx version: 1 No of confirmations: 3035327 RingCT/type: no
Extra: 022100b64353e41e49037b1589b04ec186e426534f8bd6b95053e94a7b3a1c60a694a501bbb4b252eacb7b3a3e53b0b19b78d274b2284de7f4c14f2e51508021f65a6007

4 output(s) for total of 12.828148350000 xmr

stealth address amount amount idx tag
00: 839e47f466b21437584cac5b7bcefc79124d675145f929138c4acc306d339c0f 0.028148350000 0 of 1 -
01: 90a357f7b5576af5c2cee6b6334554a573f682586b6262193ebecd092df498d4 0.800000000000 188925 of 489955 -
02: a45681de833c3a1ca3e8d84e1e3a93f47b264139aaffee1ba7739ef64be7771a 2.000000000000 121574 of 434058 -
03: 1d21a4eab15ecd0c786cc9ddbc124f9b418110ea7295be3c7d1b22997755e755 10.000000000000 322763 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-08-16 20:36:18 till 2014-10-26 07:26:57; resolution: 0.41 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_________________________________________________________________________________________________________________________________________________________________________*|

3 inputs(s) for total of 13.002709736414 xmr

key image 00: a347d1fb3596429b8a20c3d1a451139af8ba38a03bfed80dbd9047c73c06ee29 amount: 0.002709736414
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5a24ba4fd19b87e380005d03bbfb46a46a8ee775498eb39a91afb2badf519448 00176361 0 0/4 2014-08-16 21:36:18 10:136:03:49:57
key image 01: 5b082a81130378467025524d68264246d21e07934f2d82e0f586cc098b642bf4 amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5d51e17c22ec67597eccea7c9fade1f1f2fa5619348df83dab0a512dfa4b5e95 00276990 0 0/4 2014-10-26 04:22:07 10:065:21:04:08
key image 02: 3f7e90d7d9ee09189ed78da3eefaed1eb6dff121437e2b843b352be79d66896e amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: cedddc166962a227c37c4ffda983a91b7b14b07849592aa6ae3ecc416cbf1f42 00277141 0 0/4 2014-10-26 06:26:57 10:065:18:59:18
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 2709736414, "key_offsets": [ 0 ], "k_image": "a347d1fb3596429b8a20c3d1a451139af8ba38a03bfed80dbd9047c73c06ee29" } }, { "key": { "amount": 3000000000000, "key_offsets": [ 104185 ], "k_image": "5b082a81130378467025524d68264246d21e07934f2d82e0f586cc098b642bf4" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 322691 ], "k_image": "3f7e90d7d9ee09189ed78da3eefaed1eb6dff121437e2b843b352be79d66896e" } } ], "vout": [ { "amount": 28148350000, "target": { "key": "839e47f466b21437584cac5b7bcefc79124d675145f929138c4acc306d339c0f" } }, { "amount": 800000000000, "target": { "key": "90a357f7b5576af5c2cee6b6334554a573f682586b6262193ebecd092df498d4" } }, { "amount": 2000000000000, "target": { "key": "a45681de833c3a1ca3e8d84e1e3a93f47b264139aaffee1ba7739ef64be7771a" } }, { "amount": 10000000000000, "target": { "key": "1d21a4eab15ecd0c786cc9ddbc124f9b418110ea7295be3c7d1b22997755e755" } } ], "extra": [ 2, 33, 0, 182, 67, 83, 228, 30, 73, 3, 123, 21, 137, 176, 78, 193, 134, 228, 38, 83, 79, 139, 214, 185, 80, 83, 233, 74, 123, 58, 28, 96, 166, 148, 165, 1, 187, 180, 178, 82, 234, 203, 123, 58, 62, 83, 176, 177, 155, 120, 210, 116, 178, 40, 77, 231, 244, 193, 79, 46, 81, 80, 128, 33, 246, 90, 96, 7 ], "signatures": [ "7a54216ad8e3923d2f86859c8efef49aa3c4b5a31aa6c8c22337910687825d0ca8d671a45e35d69685a619fed610a8adf0ce4e6d3fbb41e7ddd7f4399ea0b500", "eecf67003030a3f549d2da4dfad271bc4345f19bb7e207213fd8b230eb55fd093e7ee1a96022581d7ad0227e0caf4fd6ffe429c89dc46d49d8086da527951d0b", "751b37b5dcd4e9faa60b34597eec11055d079e2e87b916fb64ee11f520babf0db3446ea9a8f0c753173934b7353ea8c8d0c8df2a00abaef374bfb7ed4655e00e"] }


Less details
source code | moneroexplorer