Monero Transaction d04bc08fa1f992d861c07c472a8feeff6b63806e95afffd30975b2411c89aa7e

Autorefresh is OFF

Tx hash: d04bc08fa1f992d861c07c472a8feeff6b63806e95afffd30975b2411c89aa7e

Tx prefix hash: b008ca5ab52177ea89276bee5d0de026d15a17ebe36b89fcdb238071d8d24024
Tx public key: 1d048fa8f16ca8eebbbb0475461d9f73eb657be49fbfe23ebeb02a8138ae1161

Transaction d04bc08fa1f992d861c07c472a8feeff6b63806e95afffd30975b2411c89aa7e was carried out on the Monero network on 2014-06-29 22:58:59. The transaction has 3171085 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1404082739 Timestamp [UTC]: 2014-06-29 22:58:59 Age [y:d:h:m:s]: 10:136:17:30:33
Block: 107364 Fee (per_kB): 0.005000000000 (0.005733482643) Tx size: 0.8721 kB
Tx version: 1 No of confirmations: 3171085 RingCT/type: no
Extra: 011d048fa8f16ca8eebbbb0475461d9f73eb657be49fbfe23ebeb02a8138ae1161

11 output(s) for total of 5.320000000000 xmr

stealth address amount amount idx tag
00: c944e52b875246c2236ec43a4f64c3b45772353c4388987809b25d39956b93f0 0.020000000000 194850 of 381491 -
01: c797082a84d5860951e96b57086c3370a7f22cd318053624ed81722c559442e2 0.100000000000 207109 of 982315 -
02: b3931a63aa074209cc8e5f94ad9dc55a155e5522a84060c01e2ccced3444cef3 0.100000000000 207110 of 982315 -
03: 71d704e2a989784ff52a62cc2e85bf38db8e1185cd4fb5c23bc598855253f0f5 0.100000000000 207111 of 982315 -
04: b5b64bc2239998fdbe503af5e50989e01186d09864a2c03e5fd0194b547c88cd 0.100000000000 207112 of 982315 -
05: ac54a09d750f7d968b7b7443019415e8a6f954d812850098eff1bd830b7b5c9f 0.100000000000 207113 of 982315 -
06: 2899f3bfd3a23f118d584ee04e664e352f805c63546b08cd1287720d0f23f421 0.100000000000 207114 of 982315 -
07: 3440b0047fc69650fb6c5d4a9ef287ce209bfe4763f679d4a1fca487da543676 0.200000000000 112974 of 1272210 -
08: cc0745cf86941cc808da2c669c542b67f1590b14800816499139633f2d71c935 0.200000000000 112975 of 1272210 -
09: e6f9480f6e8fbedc58bbacb7d787c6bb3dd82d1382574bf753e5b8e90be89009 0.300000000000 72959 of 976536 -
10: 76ed26e5baba67c308aefc76a57806a5e8ab5c88ed195d63a3910f73300e6fdf 4.000000000000 16331 of 237197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-29 09:18:41 till 2014-06-29 22:46:59; resolution: 0.00 days)

  • |_________________________________________________________________________________________________________________________________*________________________________________|
  • |_____________*____________________________________________________________________________________________________________________________________________________________|
  • |_____________________________________________________________________________________________________________________________________________________________*____________|
  • |___________________________________________________*______________________________________________________________________________________________________________________|

4 inputs(s) for total of 5.325000000000 xmr

key image 00: 087f65c59aef8c4a5856136c5075c7c25825c9bd15a6dcc76a8103ec231ea90d amount: 0.005000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 472107dc85930ce0a6e68ca777a8eaac55ebad554eb702cd7bd9da1abe010453 00107186 1 2/10 2014-06-29 19:34:50 10:136:20:54:42
key image 01: ed5da09161c605928622b69f9e5e8b822bff9e90d4e6c90c45f50e441c902f2b amount: 0.300000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4dd2e0533a1b15ca5e82e45973326a8ec62ccc6aa0edb511751f52ddaf720e24 00106630 1 3/6 2014-06-29 10:18:41 10:137:06:10:51
key image 02: 02a1068ac1f2020b38c14ddbcef6d8e78c8051ab85f01095873af1b2687a961c amount: 0.020000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e69212968d07e16b0b7a72bcc5283412ce75b126de21ce2d3834d676ba450edd 00107302 0 0/5 2014-06-29 21:46:59 10:136:18:42:33
key image 03: 3db53fed5093795cbc377852666a07ad5b6f5b13038d042374999a894928a45c amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4935811d4023b6e3a33bb5bb3e7ef3ec2f11ed8265f057bb5c04a1713b020c0b 00106807 0 0/5 2014-06-29 13:18:50 10:137:03:10:42
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000, "key_offsets": [ 179954 ], "k_image": "087f65c59aef8c4a5856136c5075c7c25825c9bd15a6dcc76a8103ec231ea90d" } }, { "key": { "amount": 300000000000, "key_offsets": [ 71206 ], "k_image": "ed5da09161c605928622b69f9e5e8b822bff9e90d4e6c90c45f50e441c902f2b" } }, { "key": { "amount": 20000000000, "key_offsets": [ 194787 ], "k_image": "02a1068ac1f2020b38c14ddbcef6d8e78c8051ab85f01095873af1b2687a961c" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 25484 ], "k_image": "3db53fed5093795cbc377852666a07ad5b6f5b13038d042374999a894928a45c" } } ], "vout": [ { "amount": 20000000000, "target": { "key": "c944e52b875246c2236ec43a4f64c3b45772353c4388987809b25d39956b93f0" } }, { "amount": 100000000000, "target": { "key": "c797082a84d5860951e96b57086c3370a7f22cd318053624ed81722c559442e2" } }, { "amount": 100000000000, "target": { "key": "b3931a63aa074209cc8e5f94ad9dc55a155e5522a84060c01e2ccced3444cef3" } }, { "amount": 100000000000, "target": { "key": "71d704e2a989784ff52a62cc2e85bf38db8e1185cd4fb5c23bc598855253f0f5" } }, { "amount": 100000000000, "target": { "key": "b5b64bc2239998fdbe503af5e50989e01186d09864a2c03e5fd0194b547c88cd" } }, { "amount": 100000000000, "target": { "key": "ac54a09d750f7d968b7b7443019415e8a6f954d812850098eff1bd830b7b5c9f" } }, { "amount": 100000000000, "target": { "key": "2899f3bfd3a23f118d584ee04e664e352f805c63546b08cd1287720d0f23f421" } }, { "amount": 200000000000, "target": { "key": "3440b0047fc69650fb6c5d4a9ef287ce209bfe4763f679d4a1fca487da543676" } }, { "amount": 200000000000, "target": { "key": "cc0745cf86941cc808da2c669c542b67f1590b14800816499139633f2d71c935" } }, { "amount": 300000000000, "target": { "key": "e6f9480f6e8fbedc58bbacb7d787c6bb3dd82d1382574bf753e5b8e90be89009" } }, { "amount": 4000000000000, "target": { "key": "76ed26e5baba67c308aefc76a57806a5e8ab5c88ed195d63a3910f73300e6fdf" } } ], "extra": [ 1, 29, 4, 143, 168, 241, 108, 168, 238, 187, 187, 4, 117, 70, 29, 159, 115, 235, 101, 123, 228, 159, 191, 226, 62, 190, 176, 42, 129, 56, 174, 17, 97 ], "signatures": [ "253a46215b36a587079f892dd92f3e8ebfbdd06bb9c7ccf9dcb2d952f85d6802a690f732e68252877ca3a498f7b4d486f500e69d0c40b113e2c197dde685db09", "b2855576010aa2407b38ce3f7bded5833efeea1e22df89cb74250f66e61ca80f1d7fbedbe3886585fddcd536eb3d1bfeff8767af1b9c8c521392734b5b5ad907", "f3e49300dfc0f0dc22f160dd9ecac06597dd665c643ad5af88c947a9cb31610b0aea5407f761b57922af7eb9767c4d14f3684719b98a71e0f31687a62cde360f", "d64616627c745b1ae62ab00c4ec79283ead1f13f57ea5955bf0d6ed977c5b80eda5d29c7583743d47db5c4a3b17379b0472567267028a88c98b0d83fdc413303"] }


Less details
source code | moneroexplorer