Monero Transaction cff394c4b5948f82623f9068e348b44c263a84806f28a66ebfb51c1569f0b89c

Autorefresh is OFF

Tx hash: cff394c4b5948f82623f9068e348b44c263a84806f28a66ebfb51c1569f0b89c

Tx prefix hash: daf6ea2643a3dfaba97083c72e824da7ce9d29bfed1dd314c9bf423b7a16a7f8
Tx public key: 224a1f78b08b3e738f36aa78b5ed61fc638c0451243ac8b0795489e4e1620869
Payment id: 1f9854ea35b07710485aa7169d3d5f4945ade133b17cf064cdef00a8e9d01ed1

Transaction cff394c4b5948f82623f9068e348b44c263a84806f28a66ebfb51c1569f0b89c was carried out on the Monero network on 2014-07-19 14:58:23. The transaction has 3144504 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1405781903 Timestamp [UTC]: 2014-07-19 14:58:23 Age [y:d:h:m:s]: 10:119:15:00:35
Block: 135743 Fee (per_kB): 0.005000000000 (0.007781155015) Tx size: 0.6426 kB
Tx version: 1 No of confirmations: 3144504 RingCT/type: no
Extra: 0221001f9854ea35b07710485aa7169d3d5f4945ade133b17cf064cdef00a8e9d01ed101224a1f78b08b3e738f36aa78b5ed61fc638c0451243ac8b0795489e4e1620869

4 output(s) for total of 7.895000000000 xmr

stealth address amount amount idx tag
00: 254e25cc7033eba41ae8c0c41bdd7b6cd3e63d00b623af9896bb1206f53066e3 0.005000000000 190995 of 308585 -
01: 5a06bee4941e558541be1fb047933704857065ecbef26d7b3ae640684c7a8a40 0.090000000000 84345 of 317822 -
02: 9ea507c2de582518cf225f234b3f8c4373725236a8560d390b37a1107e143491 0.800000000000 72934 of 489955 -
03: 807ce49a1d58794ecddd9ec6dd03d7a6d23009504930ff2a5eb1322ee2f3b139 7.000000000000 45490 of 285521 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-19 11:54:27 till 2014-07-19 15:07:51; resolution: 0.00 days)

  • |_____________________________________________________*____________________________________________________________________________________________________________________|
  • |_______________________________________________________________________*__________________________________________________________________________________________________|
  • |_______________________________________________________________________*__________________________________________________________________________________________________|
  • |_____________________________________________________________________________________________________________________*____________________________________________________|

4 inputs(s) for total of 7.900000000000 xmr

key image 00: 5086a6a5cbce263d14b555f89c02a5abb5e02a33190a360685634278cdac4e8b amount: 0.700000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c06836456140b861c5f0328e087af7a8f130b015ff786065bbbc0f2e4ce7e660 00135609 1 14/32 2014-07-19 12:54:27 10:119:17:04:31
key image 01: cb9c22264767632c394425cc688202770277d8e679ab3761f15dff4731e999d0 amount: 6.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ce9fa4bd779bd7e3ef96bafc178f74d82a5145f8690618cc5119b2ae80a0eaba 00135628 1 120/96 2014-07-19 13:15:12 10:119:16:43:46
key image 02: b44ef7f59ce3de0cabeb255f34be48b70f7294a6431b1d0340f70ca2ec399c32 amount: 0.700000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4d2e092a2a99476eeb98da82c5c4a1bcc210c8d13783daf29f303914e5376168 00135628 1 120/96 2014-07-19 13:15:12 10:119:16:43:46
key image 03: 141b64b94907686208500797981e3c2cfde70542e1dd27804d052fd34bb88f1a amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8979ba18b3dc09e23f19b789830a0abbd1f0c046f97be44a96537b30fd65ea81 00135680 1 18/58 2014-07-19 14:07:51 10:119:15:51:07
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 700000000000, "key_offsets": [ 72039 ], "k_image": "5086a6a5cbce263d14b555f89c02a5abb5e02a33190a360685634278cdac4e8b" } }, { "key": { "amount": 6000000000000, "key_offsets": [ 70065 ], "k_image": "cb9c22264767632c394425cc688202770277d8e679ab3761f15dff4731e999d0" } }, { "key": { "amount": 700000000000, "key_offsets": [ 72112 ], "k_image": "b44ef7f59ce3de0cabeb255f34be48b70f7294a6431b1d0340f70ca2ec399c32" } }, { "key": { "amount": 500000000000, "key_offsets": [ 140751 ], "k_image": "141b64b94907686208500797981e3c2cfde70542e1dd27804d052fd34bb88f1a" } } ], "vout": [ { "amount": 5000000000, "target": { "key": "254e25cc7033eba41ae8c0c41bdd7b6cd3e63d00b623af9896bb1206f53066e3" } }, { "amount": 90000000000, "target": { "key": "5a06bee4941e558541be1fb047933704857065ecbef26d7b3ae640684c7a8a40" } }, { "amount": 800000000000, "target": { "key": "9ea507c2de582518cf225f234b3f8c4373725236a8560d390b37a1107e143491" } }, { "amount": 7000000000000, "target": { "key": "807ce49a1d58794ecddd9ec6dd03d7a6d23009504930ff2a5eb1322ee2f3b139" } } ], "extra": [ 2, 33, 0, 31, 152, 84, 234, 53, 176, 119, 16, 72, 90, 167, 22, 157, 61, 95, 73, 69, 173, 225, 51, 177, 124, 240, 100, 205, 239, 0, 168, 233, 208, 30, 209, 1, 34, 74, 31, 120, 176, 139, 62, 115, 143, 54, 170, 120, 181, 237, 97, 252, 99, 140, 4, 81, 36, 58, 200, 176, 121, 84, 137, 228, 225, 98, 8, 105 ], "signatures": [ "074ac11adf656945f17ebf95c207ca5bc88312b1a325c761e7d017706337db023b58cb7e01909fe9f1356144e77580169755c9b268e58664a332edc732d0fa04", "7f24bf929997b60df2245e70f1ec248d2191f225dd18161b4102ea0e4d56100f2688e9a974009f9288a4c690fbeef78aa815954e8d97b6b34f1ea9b76cc4780e", "ceab784508bc1d86df75c85271ebba52dd3cab5cbb666dfb6e7190011e122504560ae77da6a95a8d153dc4bf3b8889eaa856296864eb8f2dca39a7fa8f8cb403", "caab846241882e1aaeb916ed1b77f466a722656cc7eac03bf971166e01ee450696eded2c992c9f78fd10694d30ec930e92609764ceef94a03c8fba75c02fd005"] }


Less details
source code | moneroexplorer