Monero Transaction d2af48df2aa12fb30f8e99db2fd077fb085034aebdeccc9219a1689e5ea7429f

Autorefresh is OFF

Tx hash: d2af48df2aa12fb30f8e99db2fd077fb085034aebdeccc9219a1689e5ea7429f

Tx prefix hash: 31e7be6515e3825f4c65019aaf89e88a6111329e8ec634aa627e94708f325142
Tx public key: 485cfd496dd4cdf8a9050f5c3abf1ae9c87ef2a84731c01b48ef239c395e4980
Payment id: 16319252bf98ef8845b67e9350f9b171e088414bf2c11e792a9ead60b7af6b13

Transaction d2af48df2aa12fb30f8e99db2fd077fb085034aebdeccc9219a1689e5ea7429f was carried out on the Monero network on 2015-05-26 17:55:21. The transaction has 2715051 confirmations. Total output fee is 0.025869430000 XMR.

Timestamp: 1432662921 Timestamp [UTC]: 2015-05-26 17:55:21 Age [y:d:h:m:s]: 09:195:07:41:49
Block: 580923 Fee (per_kB): 0.025869430000 (0.027622832450) Tx size: 0.9365 kB
Tx version: 1 No of confirmations: 2715051 RingCT/type: no
Extra: 02210016319252bf98ef8845b67e9350f9b171e088414bf2c11e792a9ead60b7af6b1301485cfd496dd4cdf8a9050f5c3abf1ae9c87ef2a84731c01b48ef239c395e4980

9 output(s) for total of 225.015000000000 xmr

stealth address amount amount idx tag
00: 62efba4509144cf622ef3d1a6b577c12d79bb2be5c30d171ebe60affe790f05d 0.005000000000 234251 of 308585 -
01: 712dd7f85ffd9cfb212c6376f39936c84ddd232b4f480ca85abd978bad9e0c2f 0.040000000000 172459 of 294095 -
02: e598eceacdcd0e1c8a62293102a925093d1f7a43638b65f488569af217c2665a 0.070000000000 136089 of 263947 -
03: c1edb845475e6ac4bcc5392ce66562cef7b261ed0bc97c9a73a9b36aa46adec2 0.100000000000 759041 of 982315 -
04: 4272442fa352d6013c34c45c231f516409629cea6af4ee85f3f94f1d25193873 0.800000000000 291110 of 489955 -
05: 2243ade97e7dc302dedcbf6ff26c6b8c00dd4fdc9470d3fc9c8262fc2db6ba9e 1.000000000000 566282 of 874629 -
06: 7a73a690edf0a3f0f95bf7d0a46c3aec4e886b83af704165e5b6982f6a213b60 3.000000000000 193088 of 300495 -
07: be451bc9098d102c65cb5df342069c8845e74a877d5f8f673454d5f1f83491bc 20.000000000000 33793 of 78991 -
08: 8fdd0ace2de157025ecf40423c14194a3de9d07188ccb8562a9ffa99889df716 200.000000000000 7284 of 31883 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-08-03 23:38:50 till 2015-05-26 18:02:25; resolution: 1.74 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_______________________________________________________________________________________________________________________________________________________________________*__|
  • |________________________________________________________________________________________________________________________________________________________________________*_|
  • |_________________________________________________________________________________________________________________________________________________________________________*|

5 inputs(s) for total of 225.040869430000 xmr

key image 00: 22eef0ab2b3eb1ab891e97e22aed83afa451600ee4d2b339a1bfd07ea9caeadc amount: 0.000869430000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 68b4fd94375c86c81d45979070c5fdf0bc483bc0da00257ee23d6df6bab41f97 00157903 2 3/9 2014-08-04 00:38:50 10:126:00:58:20
key image 01: 981a04aa5824da2a1fc49696530281595f74dccf5d6bc9f395491a4e42cac9fe amount: 20.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e810b3d165b09350fcf433f7eb2ec805dd4a78fd8768b6cc685cf709f9ace853 00580871 1 51/2 2015-05-26 17:02:25 09:195:08:34:45
key image 02: 933ff7fa8c9c763430c6c4c3cc196d1b709761f6ed36ecc8aa984fd2e21e6314 amount: 0.040000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0b06e2d37687a3ea441cced4d80ccd573ef0d77ae56ba47496bc87dc109178d6 00575016 1 178/7 2015-05-22 15:33:47 09:199:10:03:23
key image 03: 1d68a72d920c6f0c2f47944c1580852b22aad8a09ff7d13d2f299abc94907703 amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 312fc98ca3ce244aa530d09188cd9ec673f0b736cbe6a252781c145c13621251 00576428 1 3/3 2015-05-23 15:23:21 09:198:10:13:49
key image 04: 3615c8f9a1cb67ee3ae2bf0fc17ee0730ec77b576e22cc0e4d9ab8aec0e7dfc2 amount: 200.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: fc0fac67018d153ae08497eb5cbc6a665635a645bd70459a9b981298c099bdf4 00579976 1 39/8 2015-05-26 03:37:11 09:195:21:59:59
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 869430000, "key_offsets": [ 0 ], "k_image": "22eef0ab2b3eb1ab891e97e22aed83afa451600ee4d2b339a1bfd07ea9caeadc" } }, { "key": { "amount": 20000000000000, "key_offsets": [ 33788 ], "k_image": "981a04aa5824da2a1fc49696530281595f74dccf5d6bc9f395491a4e42cac9fe" } }, { "key": { "amount": 40000000000, "key_offsets": [ 171420 ], "k_image": "933ff7fa8c9c763430c6c4c3cc196d1b709761f6ed36ecc8aa984fd2e21e6314" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 169617 ], "k_image": "1d68a72d920c6f0c2f47944c1580852b22aad8a09ff7d13d2f299abc94907703" } }, { "key": { "amount": 200000000000000, "key_offsets": [ 7272 ], "k_image": "3615c8f9a1cb67ee3ae2bf0fc17ee0730ec77b576e22cc0e4d9ab8aec0e7dfc2" } } ], "vout": [ { "amount": 5000000000, "target": { "key": "62efba4509144cf622ef3d1a6b577c12d79bb2be5c30d171ebe60affe790f05d" } }, { "amount": 40000000000, "target": { "key": "712dd7f85ffd9cfb212c6376f39936c84ddd232b4f480ca85abd978bad9e0c2f" } }, { "amount": 70000000000, "target": { "key": "e598eceacdcd0e1c8a62293102a925093d1f7a43638b65f488569af217c2665a" } }, { "amount": 100000000000, "target": { "key": "c1edb845475e6ac4bcc5392ce66562cef7b261ed0bc97c9a73a9b36aa46adec2" } }, { "amount": 800000000000, "target": { "key": "4272442fa352d6013c34c45c231f516409629cea6af4ee85f3f94f1d25193873" } }, { "amount": 1000000000000, "target": { "key": "2243ade97e7dc302dedcbf6ff26c6b8c00dd4fdc9470d3fc9c8262fc2db6ba9e" } }, { "amount": 3000000000000, "target": { "key": "7a73a690edf0a3f0f95bf7d0a46c3aec4e886b83af704165e5b6982f6a213b60" } }, { "amount": 20000000000000, "target": { "key": "be451bc9098d102c65cb5df342069c8845e74a877d5f8f673454d5f1f83491bc" } }, { "amount": 200000000000000, "target": { "key": "8fdd0ace2de157025ecf40423c14194a3de9d07188ccb8562a9ffa99889df716" } } ], "extra": [ 2, 33, 0, 22, 49, 146, 82, 191, 152, 239, 136, 69, 182, 126, 147, 80, 249, 177, 113, 224, 136, 65, 75, 242, 193, 30, 121, 42, 158, 173, 96, 183, 175, 107, 19, 1, 72, 92, 253, 73, 109, 212, 205, 248, 169, 5, 15, 92, 58, 191, 26, 233, 200, 126, 242, 168, 71, 49, 192, 27, 72, 239, 35, 156, 57, 94, 73, 128 ], "signatures": [ "0182a7c11ae362f833655dc3fb451459077993e32073fcc4c010f3a315fc6f0e5c1e9f88b3200c8c5d68d0d3a00f3ebbdc11fcd8154519c62b6b4b1892125b0e", "fdd3108e41eec5eae758425b05f3c3990e343a2971f67cb5132bfe78754ae30dc3d5044069bea63ae1159256c7b9507f16632c9ec1a45e140164f65b9f831408", "3eae508579915e866e58572e9c683ebef8de010ac8288cc3ee6eed0fc2c1180340fcc7929c393d66b6c41e00798fac4f153dbfcd87bbdd4f3b504732a01f1b0b", "f699db6b7bcd95ebbb39bee5cd9c2ffa8abf9cdbd363a8b853048813dd3fdd0e93759b1b468e1060b4005f293d4dcd90389b2c123d4d306742d9731fbc52ca02", "0c0de083217e5d2d3c1d3778fe1ea3ceea2d60f01d32cb0eb76222f3106eaf0e19c8e5d902410793346c6cff3a94d424e84e8430830b6246801b050df24e7604"] }


Less details
source code | moneroexplorer