Monero Transaction d2ff471808cdc971afcc348e814c3caed6581754cd036af4df1913c5329bb390

Autorefresh is OFF

Tx hash: d2ff471808cdc971afcc348e814c3caed6581754cd036af4df1913c5329bb390

Tx prefix hash: 988e3e4077ce34713edcc8f79f05eb9d7b541682ffcfd76c9ad30fba6afe67cd
Tx public key: c4f98076108f7790edf0996faa8f8aa374319e5a834934e546d9ab3f8f01c164

Transaction d2ff471808cdc971afcc348e814c3caed6581754cd036af4df1913c5329bb390 was carried out on the Monero network on 2014-06-19 14:06:02. The transaction has 3186069 confirmations. Total output fee is 0.005216981425 XMR.

Timestamp: 1403186762 Timestamp [UTC]: 2014-06-19 14:06:02 Age [y:d:h:m:s]: 10:146:23:41:26
Block: 92297 Fee (per_kB): 0.005216981425 (0.005787853715) Tx size: 0.9014 kB
Tx version: 1 No of confirmations: 3186069 RingCT/type: no
Extra: 01c4f98076108f7790edf0996faa8f8aa374319e5a834934e546d9ab3f8f01c164

9 output(s) for total of 16.195425183642 xmr

stealth address amount amount idx tag
00: c899a9ed245cc43762c6294c30b9a3af71b6be29511549f54d7aa91033ac44fb 0.000745516229 0 of 1 -
01: c0d4781ac0b6e3d24122fdef103be63b9ec7b0bff04c2fa2395efa67670587b4 0.004679667413 0 of 1 -
02: 63846eff001266978fea7db8fafde36e3430a3fa309d4af9079f886df5989924 0.040000000000 101204 of 294095 -
03: 0576069dc2002344fdd95e3ad762793a1add0c2bcd18c944a2480db4d71ad2cb 0.070000000000 67856 of 263947 -
04: 45396b6ecfa39ce8a954286d3741b09dce5347d13e080c656887e30c491ca63b 0.080000000000 62467 of 269576 -
05: fbfb6c3e1e346f592892e41c065344611837ccd5178605911ff1e67ba3f7c936 0.200000000000 68231 of 1272210 -
06: 474adcda5f33df80abb66fca5db10814dbebc82b593dc5af1ae7bff0bf8fdddc 0.800000000000 22417 of 489955 -
07: 6281ab2ea769df8f193984c1fed60c8d29a8adf16a2dff21b5d244e2f327fb84 5.000000000000 15301 of 255089 -
08: 66948026ee7ee70b935d762976bfd7efa59556a62eeaa538659ceeb1a6e73a61 10.000000000000 98754 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-18 13:45:57 till 2014-06-19 14:06:40; resolution: 0.01 days)

  • |_______*__________________________________________________________________________________________________________________________________________________________________|
  • |________________________________________________________________________________________________________________________________________________________________*_________|
  • |___________________________________________________________________________________________________________________________________________________________________*______|
  • |__________________________________________________________________________________________________________________________________________________________________*_______|
  • |_______________________________________________________________________________________________________________________________________________________*__________________|

5 inputs(s) for total of 16.200642165067 xmr

key image 00: f2701b042c4353299b36c0a17167f9fc98d9982c042e4d32f0ab5161cad1b143 amount: 0.000642165067
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c43302150aa989601343073c02b30366cff38f0564e9d8c8cf451e5066bb1e1c 00090860 0 0/5 2014-06-18 14:45:57 10:147:23:01:31
key image 01: 4b0b3941f8a1bef762121313abcae636ebe6f8eb0913a5b52e9b3d1a5b5d7bb0 amount: 6.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d8deb8e89e7119ff086cdc5bdbb0de6ea0b5c1fc8bf8a2109eea861a1f338c3c 00092212 0 0/6 2014-06-19 12:41:56 10:147:01:05:32
key image 02: 0939ef5e825e4d27debc419d67b2a031cd37faa130438b53a058beb392b9e463 amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 33e718e89c4642206ee4fa8142cf3ef8c06b7e190d90733841c55aa970f1c691 00092235 0 0/6 2014-06-19 13:06:40 10:147:00:40:48
key image 03: aff43721e0a6893ebc1e8368a8348ef36b190694bba41bd70083587724c5e6f2 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1b0c75fda7f84a10a41e7736b8d6f709240572759576e656bc065c52035ffaff 00092229 0 0/5 2014-06-19 13:01:10 10:147:00:46:18
key image 04: 616e61781899d7472146faf5a26f403a5848c0376ce7bac99383f529fc0e2147 amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 08b826af48825e9eff6acecc5e4de27667d8f236657e6a90b7ceb8380d9fbed4 00092137 0 0/6 2014-06-19 11:30:28 10:147:02:17:00
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 642165067, "key_offsets": [ 0 ], "k_image": "f2701b042c4353299b36c0a17167f9fc98d9982c042e4d32f0ab5161cad1b143" } }, { "key": { "amount": 6000000000000, "key_offsets": [ 55868 ], "k_image": "4b0b3941f8a1bef762121313abcae636ebe6f8eb0913a5b52e9b3d1a5b5d7bb0" } }, { "key": { "amount": 100000000000, "key_offsets": [ 126172 ], "k_image": "0939ef5e825e4d27debc419d67b2a031cd37faa130438b53a058beb392b9e463" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 98658 ], "k_image": "aff43721e0a6893ebc1e8368a8348ef36b190694bba41bd70083587724c5e6f2" } }, { "key": { "amount": 100000000000, "key_offsets": [ 125701 ], "k_image": "616e61781899d7472146faf5a26f403a5848c0376ce7bac99383f529fc0e2147" } } ], "vout": [ { "amount": 745516229, "target": { "key": "c899a9ed245cc43762c6294c30b9a3af71b6be29511549f54d7aa91033ac44fb" } }, { "amount": 4679667413, "target": { "key": "c0d4781ac0b6e3d24122fdef103be63b9ec7b0bff04c2fa2395efa67670587b4" } }, { "amount": 40000000000, "target": { "key": "63846eff001266978fea7db8fafde36e3430a3fa309d4af9079f886df5989924" } }, { "amount": 70000000000, "target": { "key": "0576069dc2002344fdd95e3ad762793a1add0c2bcd18c944a2480db4d71ad2cb" } }, { "amount": 80000000000, "target": { "key": "45396b6ecfa39ce8a954286d3741b09dce5347d13e080c656887e30c491ca63b" } }, { "amount": 200000000000, "target": { "key": "fbfb6c3e1e346f592892e41c065344611837ccd5178605911ff1e67ba3f7c936" } }, { "amount": 800000000000, "target": { "key": "474adcda5f33df80abb66fca5db10814dbebc82b593dc5af1ae7bff0bf8fdddc" } }, { "amount": 5000000000000, "target": { "key": "6281ab2ea769df8f193984c1fed60c8d29a8adf16a2dff21b5d244e2f327fb84" } }, { "amount": 10000000000000, "target": { "key": "66948026ee7ee70b935d762976bfd7efa59556a62eeaa538659ceeb1a6e73a61" } } ], "extra": [ 1, 196, 249, 128, 118, 16, 143, 119, 144, 237, 240, 153, 111, 170, 143, 138, 163, 116, 49, 158, 90, 131, 73, 52, 229, 70, 217, 171, 63, 143, 1, 193, 100 ], "signatures": [ "b11cce0050f8e58e7f133ccf8201798f9ae4b637635c86e5b64e325c345c130d67c6a4e8c4b6372bcdd7f4c8b673a67c17ca17168a3f43a95f8f6456da90340a", "07a1aa1c7fc459dedc3ad282d112c05729cd2b5a538638271bc5e0b047b9680dd9442fcc570f70be07eedb74391485ce4029f212a850f7d258439ea7fe4b0202", "9675f64f8a1e495d726bbeaff40b49601e5f7e26c00fdcd538554667c77eec003d9332888307134dbe7550a6ff1ba0a046d73e70ffe7e9aea4cb9b5b09730708", "b7af2e69eedff0cd5d9c3ad131f2091454510fed81cf06de2934a9cb0aaf2b02ea7af423525e61265b3164b18137d018fa9337005cc2349a04f9d9edf6327105", "eaf1fb60a2d79f576654d7eeaf72ca9367bffd3c54e67a2c3d8682a952427908d3604e0dbef900a5786b6cdc775fce77dbf7da049bc2a7ce7a34f139b7ecd908"] }


Less details
source code | moneroexplorer