Monero Transaction d139a6099a59fcccf8dbd207e0e01f033b9697a3102962cd690fb0b7f0f8de19

Autorefresh is OFF

Tx hash: d139a6099a59fcccf8dbd207e0e01f033b9697a3102962cd690fb0b7f0f8de19

Tx prefix hash: 66a546da160da655b9f3e403894db63dbf983349052d03fcc7d3cb6100c922e4
Tx public key: 693b6a93d7b102160a6aa42eef81475b2afed99db62ec68311fac04a35db9050
Payment id: fe9fcb8c4e4c184243c454d8d521c9cb2cc56b8e5eef2d452abd31647f273f4f

Transaction d139a6099a59fcccf8dbd207e0e01f033b9697a3102962cd690fb0b7f0f8de19 was carried out on the Monero network on 2014-08-30 07:16:02. The transaction has 3108645 confirmations. Total output fee is 0.181900590000 XMR.

Timestamp: 1409382962 Timestamp [UTC]: 2014-08-30 07:16:02 Age [y:d:h:m:s]: 10:111:10:19:05
Block: 195712 Fee (per_kB): 0.181900590000 (0.231962894346) Tx size: 0.7842 kB
Tx version: 1 No of confirmations: 3108645 RingCT/type: no
Extra: 022100fe9fcb8c4e4c184243c454d8d521c9cb2cc56b8e5eef2d452abd31647f273f4f01693b6a93d7b102160a6aa42eef81475b2afed99db62ec68311fac04a35db9050

5 output(s) for total of 21.823099410000 xmr

stealth address amount amount idx tag
00: c2767d4d0a4e6f229d774ddbd68f8091747d4436bdf9a4aadcb7a17f470e77ff 0.023099410000 0 of 1 -
01: 219a78dbd29e1ff31296a32926c939b0aa16b65aef6add59f646020bc980a3c3 0.300000000000 189260 of 976536 -
02: 539561123a54573771774e43233e6da5bc591f311af72d99cad822c9467a9365 0.500000000000 268540 of 1118624 -
03: 36d124704fd558fdfa2df07e213b83b3ba6f1839b5d76ecb5dc74d188f5941cb 1.000000000000 225466 of 874630 -
04: ebc881dc6a95c5384351d9ee1736437b6d6dfe42fd3c3a7641d7fb0a451a53ac 20.000000000000 11364 of 78991 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-08-17 23:22:49 till 2014-08-30 05:27:46; resolution: 0.07 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________*________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |________________________________________________________________________________________________________________________________________________________________________*_|
  • |___________________________________________________________________________________________________________________________________________________________________*______|

5 inputs(s) for total of 22.005000000000 xmr

key image 00: df23e048d2c20ebff99a15a788b339e89b83b6870048927b92bddf3be05d412f amount: 0.005000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 57784c075e98dfc45a3128d91013df13339c2cc495cfa38033380d004ff99da7 00177922 2 4/7 2014-08-18 00:22:49 10:123:17:12:18
key image 01: 6459f0b024e75853003cf1cfcf1f20cc91790fd92fab2a924eddcc21d47fe4f9 amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 203c81177e49f34d0c508d797b327868aba889aaca702234ce04f50b85ccd0c7 00194674 0 0/4 2014-08-29 14:10:40 10:112:03:24:27
key image 02: 07b5834ebb24cd1125f30b9f68796c00afbf743d39c681ab1223ce3a9fae87de amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ea1784c5b190237af6dd07f3555a744795ee7f6b55f5b2fac002d67a612b2c6a 00195500 0 0/4 2014-08-30 04:27:46 10:111:13:07:21
key image 03: e4d556c1205dac76a70f5dffa856d51f5bc629c937adbc2ae9f49fb9361e5b7d amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 90ff2e5813c56737b64014e11b79bdbb002f8041facb48cf3fc468d3c8a7faae 00195429 1 4/5 2014-08-30 03:26:46 10:111:14:08:21
key image 04: 6e3d9243b87550f3f710bae5355b37435deac47b18a74c69ac1e09f83ea58d9d amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 533d50cf858e709ce774d717828febecf25311fe617c5b522bcaef9a0d129530 00194901 0 0/4 2014-08-29 18:01:06 10:111:23:34:01
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000, "key_offsets": [ 214238 ], "k_image": "df23e048d2c20ebff99a15a788b339e89b83b6870048927b92bddf3be05d412f" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 65496 ], "k_image": "6459f0b024e75853003cf1cfcf1f20cc91790fd92fab2a924eddcc21d47fe4f9" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 226067 ], "k_image": "07b5834ebb24cd1125f30b9f68796c00afbf743d39c681ab1223ce3a9fae87de" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 66367 ], "k_image": "e4d556c1205dac76a70f5dffa856d51f5bc629c937adbc2ae9f49fb9361e5b7d" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 65777 ], "k_image": "6e3d9243b87550f3f710bae5355b37435deac47b18a74c69ac1e09f83ea58d9d" } } ], "vout": [ { "amount": 23099410000, "target": { "key": "c2767d4d0a4e6f229d774ddbd68f8091747d4436bdf9a4aadcb7a17f470e77ff" } }, { "amount": 300000000000, "target": { "key": "219a78dbd29e1ff31296a32926c939b0aa16b65aef6add59f646020bc980a3c3" } }, { "amount": 500000000000, "target": { "key": "539561123a54573771774e43233e6da5bc591f311af72d99cad822c9467a9365" } }, { "amount": 1000000000000, "target": { "key": "36d124704fd558fdfa2df07e213b83b3ba6f1839b5d76ecb5dc74d188f5941cb" } }, { "amount": 20000000000000, "target": { "key": "ebc881dc6a95c5384351d9ee1736437b6d6dfe42fd3c3a7641d7fb0a451a53ac" } } ], "extra": [ 2, 33, 0, 254, 159, 203, 140, 78, 76, 24, 66, 67, 196, 84, 216, 213, 33, 201, 203, 44, 197, 107, 142, 94, 239, 45, 69, 42, 189, 49, 100, 127, 39, 63, 79, 1, 105, 59, 106, 147, 215, 177, 2, 22, 10, 106, 164, 46, 239, 129, 71, 91, 42, 254, 217, 157, 182, 46, 198, 131, 17, 250, 192, 74, 53, 219, 144, 80 ], "signatures": [ "d4fca7913cf1b4cbf8fa48d93079ee2d524af49e8b9d11735ebc9568cda2f80da8f178cc9e76ee774aab1437d8a9b5fbcf969e5cf65d3ece9f7ad43f3a7b3a00", "1eae85a906c2624e5142868f2bf6dcc96c250ad7eba3dd01cae5d324ef72520d73f1b4b4598f6aca7b10faf34e0b2583e3fa9defa067f150e634790842ecac09", "f03f802f4e6292bbf46931ae4f7fc3f626ea4b3f041ad69f0f2d609d8a1b2506633110441d8a61bab9cbc74d52573ea93a42aeca6f76ebc4637e0c94e2dbeb09", "a478260c5839e30e36a0bc6e1d0818a1707bc24069fe0e5f8974e874adaf60052021529e54706ae5289b33dbb99e004fc7759c2a7929c7da8ca0106cf6955c04", "4d7a0eae88cbb83e3aa75209c815c570c3450e1a34f78bc4ebe50b7ae5adf906b47caa037294f54bc49cfdb37c1eb3688b9618bee81813b137781b0a73d6150f"] }


Less details
source code | moneroexplorer