Monero Transaction cf070d7f7d05dff708be27188ccf836a4d5df1c06472990017759ac2abfe0344

Autorefresh is OFF

Tx hash: cf070d7f7d05dff708be27188ccf836a4d5df1c06472990017759ac2abfe0344

Tx prefix hash: a1bc3b2d774d427b8b9f50ea9a25c67d81f04b6c6f8ec5572dd6554733611ba6
Tx public key: e7cf67995abc74d9fa528c564787e6e712e0566c74a373c448a6c8c32f27597c
Payment id: 5ad5cb84c3134163aebd287afd455f50bd6921bfd20fed5d2fc7a186e01a6b81

Transaction cf070d7f7d05dff708be27188ccf836a4d5df1c06472990017759ac2abfe0344 was carried out on the Monero network on 2014-08-13 03:03:16. The transaction has 3125034 confirmations. Total output fee is 0.005961510000 XMR.

Timestamp: 1407898996 Timestamp [UTC]: 2014-08-13 03:03:16 Age [y:d:h:m:s]: 10:116:22:55:03
Block: 170947 Fee (per_kB): 0.005961510000 (0.006110696937) Tx size: 0.9756 kB
Tx version: 1 No of confirmations: 3125034 RingCT/type: no
Extra: 0221005ad5cb84c3134163aebd287afd455f50bd6921bfd20fed5d2fc7a186e01a6b8101e7cf67995abc74d9fa528c564787e6e712e0566c74a373c448a6c8c32f27597c

6 output(s) for total of 6.040038490000 xmr

stealth address amount amount idx tag
00: ce8f083c22bcd2c592e738f65bff18d4de170ed0547f45563216d2cf38e516b1 0.000038490000 0 of 1 -
01: 0bd35b8757f81565062e8cd1222791f9180ed6b197bc9391f7b0a4199ec2ce22 0.050000000000 118327 of 284521 -
02: 294d3a3b127a931c14b579f6152dab37abde6d1abda428003ac1589be7f34078 0.090000000000 103886 of 317822 -
03: c2746ad143d1b270e62e870eefe8a89525f35b266c9a0e6f8acb8eaad491633d 0.900000000000 85488 of 454894 -
04: e9519be07789056afc44244a87b3af813b62602db092ad051ad7adf1c70d2909 1.000000000000 186071 of 874629 -
05: e2fafca3649df5a65288fd5f156b21aeb42e3726258b58c562835bcb310583cb 4.000000000000 37217 of 237197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-22 18:46:39 till 2014-08-13 03:15:41; resolution: 0.48 days)

  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |_____________________________________________*___________________________________________________________________________________________________________________________*|
  • |___________________________________________________________________________________*_____________________________________________________________________________________*|
  • |___________________________________________________________________________________________________________*_____________________________________________________________*|

4 inputs(s) for total of 6.046000000000 xmr

key image 00: 7be5c3c248b3fd7e327618b18c35ebca4749d21c9e4165c73472fbeb83ba35b3 amount: 0.006000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0f22ba585acbcc2ca3ccd9c56eaa819bbf0e58d41fc41aced2770e43349a0886 00051870 1 26/839 2014-05-22 19:46:39 10:199:06:11:40
- 01: 73b743e07d94cf0dc6c3c1e77c51a174481483afad25affe75a0ce242624371a 00170878 2 2/7 2014-08-13 01:38:11 10:117:00:20:08
key image 01: 582256b8fd4ef0e388b4e35509e1dd2ea961487a874109d833fefe18e8aaa7d6 amount: 0.040000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5981821c9b199998cd5c7f93f53af275196dba7742742e6f718d6be451dc7716 00083352 1 8/153 2014-06-13 11:03:15 10:177:14:55:04
- 01: 6aaafed13fe274fbf74b8135be96762726c0fec61454acff4415a97921c6c1bf 00170904 2 3/121 2014-08-13 02:15:41 10:116:23:42:38
key image 02: 3335387bc5c3b8c888125314792dfb11cc58cb61bf42f0f269483d2bf27fb492 amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 209a7cce0f7ab17a3b04fa8bbf6c5d698ac512fcbb2ce82a248a06d5ab3cd99e 00109983 1 25/61 2014-07-01 18:05:07 10:159:07:53:12
- 01: d70062d3f0f76a7753b53a6c780933011c7683960c1431b532c06128e9532b8e 00170876 0 0/5 2014-08-13 01:37:21 10:117:00:20:58
key image 03: f53c3f7d1ff4c5bceda3b34fe1a494d85e376ae541644e77b713ee2f2eb449b8 amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 806f28513e26c529053a34bb31e3b846a7e49740daa5276b79dbf852f10411cf 00126867 1 17/56 2014-07-13 14:33:33 10:147:11:24:46
- 01: 78d53b8714877d09faa8edf1543cbaeb7fbeb04499367edfb93fc33f1bf4959a 00170690 2 9/103 2014-08-12 21:59:23 10:117:03:58:56
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 6000000000, "key_offsets": [ 7496, 175319 ], "k_image": "7be5c3c248b3fd7e327618b18c35ebca4749d21c9e4165c73472fbeb83ba35b3" } }, { "key": { "amount": 40000000000, "key_offsets": [ 69420, 64685 ], "k_image": "582256b8fd4ef0e388b4e35509e1dd2ea961487a874109d833fefe18e8aaa7d6" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 17142, 19994 ], "k_image": "3335387bc5c3b8c888125314792dfb11cc58cb61bf42f0f269483d2bf27fb492" } }, { "key": { "amount": 2000000000000, "key_offsets": [ 40680, 31996 ], "k_image": "f53c3f7d1ff4c5bceda3b34fe1a494d85e376ae541644e77b713ee2f2eb449b8" } } ], "vout": [ { "amount": 38490000, "target": { "key": "ce8f083c22bcd2c592e738f65bff18d4de170ed0547f45563216d2cf38e516b1" } }, { "amount": 50000000000, "target": { "key": "0bd35b8757f81565062e8cd1222791f9180ed6b197bc9391f7b0a4199ec2ce22" } }, { "amount": 90000000000, "target": { "key": "294d3a3b127a931c14b579f6152dab37abde6d1abda428003ac1589be7f34078" } }, { "amount": 900000000000, "target": { "key": "c2746ad143d1b270e62e870eefe8a89525f35b266c9a0e6f8acb8eaad491633d" } }, { "amount": 1000000000000, "target": { "key": "e9519be07789056afc44244a87b3af813b62602db092ad051ad7adf1c70d2909" } }, { "amount": 4000000000000, "target": { "key": "e2fafca3649df5a65288fd5f156b21aeb42e3726258b58c562835bcb310583cb" } } ], "extra": [ 2, 33, 0, 90, 213, 203, 132, 195, 19, 65, 99, 174, 189, 40, 122, 253, 69, 95, 80, 189, 105, 33, 191, 210, 15, 237, 93, 47, 199, 161, 134, 224, 26, 107, 129, 1, 231, 207, 103, 153, 90, 188, 116, 217, 250, 82, 140, 86, 71, 135, 230, 231, 18, 224, 86, 108, 116, 163, 115, 196, 72, 166, 200, 195, 47, 39, 89, 124 ], "signatures": [ "fa05ec1e05334d12a85148c0dc3ccf5bb053d04583c3545cd0b5eb0dd4574e0c5c9bacebd50abc1983eb2e9c1356f925ba7a8a4e77c877a3f2ec94164ae16802253e2f632e88cb56ef1dd6e923f59eeefdd655f2e66c83262f005b173230be029da0349386bd211acb615d59cabf3d3a9523f02bcf737f23d51fce67031aec02", "a765a7bda41cc5e595bf38cdddcd75b7b208105dcb9998cc06f870b8ac45620aff88ac35431ea6a7834da6001b53fe961381898104d905f95a42050041075a06e9557b5a15e5fd0c39ac741b711009b2ce91086eb7cd62289d284fdc5333ec034329589a8135b33a11ed3642d3916571aa9e90374faab4fad932a8d009ede903", "2139c05f6a2ba53dec501c324c591cbd7af3053a94c29f13300c53e5a5e12f02996ef66c8303c3107942c9414c75458f03a585c65d3bb18e1a1462698381ce0ca9f109f0a455302912d4db85135c0525d6b8bd6330d5d8d65526b3495f53b00bf8ef907b324a1433a7a5529a9934351b3cd525519008a8cfad8cd2e6c7c04b0e", "fba7e56c2cc4cd9601530687b951a5b4e05f2ad9ef63505d81902cfd7c92a90dc4c39a4778d159046d1ea84a7f1300011ffc8315dd147652ab72cc121b49540d7f5359a35155e71c32d7d9908109da9cb2a096bade7ba0e29622a6eff4e15202d74f5ec84e07a8f0ff90b4685c79731b860825c176a140ea4c3981adb6455d0a"] }


Less details
source code | moneroexplorer