Monero Transaction db1fd34b7e6df9198a9c505f0f1b0fe58179e6e9bf3317435112a7c93f365007

Autorefresh is OFF

Tx hash: db1fd34b7e6df9198a9c505f0f1b0fe58179e6e9bf3317435112a7c93f365007

Tx prefix hash: ca2b62076534deb1d7fb16ec4e5e6654ad6c641da697f2c677284179cda28940
Tx public key: e244b859fcd4fc44732a9994c33cc14f388d1f1408d281b803677d75e2053462

Transaction db1fd34b7e6df9198a9c505f0f1b0fe58179e6e9bf3317435112a7c93f365007 was carried out on the Monero network on 2014-06-16 06:22:55. The transaction has 3204821 confirmations. Total output fee is 0.000001000000 XMR.

Timestamp: 1402899775 Timestamp [UTC]: 2014-06-16 06:22:55 Age [y:d:h:m:s]: 10:169:14:36:30
Block: 87443 Fee (per_kB): 0.000001000000 (0.000002805479) Tx size: 0.3564 kB
Tx version: 1 No of confirmations: 3204821 RingCT/type: no
Extra: 01e244b859fcd4fc44732a9994c33cc14f388d1f1408d281b803677d75e2053462

3 output(s) for total of 1.000000000000 xmr

stealth address amount amount idx tag
00: 0adb42c6cc7a7dc1fb9ba4a171c846d4da2f70b7fee143146697fc1c6591f11a 0.010000000000 249951 of 502466 -
01: c260fd8010556bcd24f47083182fb1a740ad2d079376a9ade3e6812079610ab2 0.090000000000 49517 of 317822 -
02: 13f299149b3cc38a19677f8e5f675a1bf720df8113993868263e97773b09f6bd 0.900000000000 19173 of 454894 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-12 15:45:47 till 2014-06-16 06:35:19; resolution: 0.02 days)

  • |________________________________________________________________________________________________________________________________________________________________________*_|
  • |__*_______________________________________________________________________________________________________________________________________________________________________|

2 inputs(s) for total of 1.000001000000 xmr

key image 00: 77931ec38811d14a5e611917d0bf1b2b8a49f66439b0259f0c2b829dbd7b568b amount: 0.000001000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9488da152b0bd26f0abee33ff7d3958e647c03fb2991cec08038167456f02f3b 00087377 1 50/15 2014-06-16 05:35:19 10:169:15:24:06
key image 01: ab13a1ace7bba6b583e4f4ac1e6ee9c088a47b625d919e6dc25504ce9da22d94 amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: bd999806ebd6b546509acff29c7e1b687d40574197d679ef63de6aa0f6d0a4cd 00082231 0 0/6 2014-06-12 16:45:47 10:173:04:13:38
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 1000000, "key_offsets": [ 18150 ], "k_image": "77931ec38811d14a5e611917d0bf1b2b8a49f66439b0259f0c2b829dbd7b568b" } }, { "key": { "amount": 1000000000000, "key_offsets": [ 18344 ], "k_image": "ab13a1ace7bba6b583e4f4ac1e6ee9c088a47b625d919e6dc25504ce9da22d94" } } ], "vout": [ { "amount": 10000000000, "target": { "key": "0adb42c6cc7a7dc1fb9ba4a171c846d4da2f70b7fee143146697fc1c6591f11a" } }, { "amount": 90000000000, "target": { "key": "c260fd8010556bcd24f47083182fb1a740ad2d079376a9ade3e6812079610ab2" } }, { "amount": 900000000000, "target": { "key": "13f299149b3cc38a19677f8e5f675a1bf720df8113993868263e97773b09f6bd" } } ], "extra": [ 1, 226, 68, 184, 89, 252, 212, 252, 68, 115, 42, 153, 148, 195, 60, 193, 79, 56, 141, 31, 20, 8, 210, 129, 184, 3, 103, 125, 117, 226, 5, 52, 98 ], "signatures": [ "00584706b7e94c6e691751b5d84ce3bc0240c480a681f868e8b1207408ca780dad4e8b56360380c7b0ee3390b6c936837333ec7b365df88998ff30172136b70d", "ef640a5e6c3025c8908a231e2f35cc96980943619629dc20c0e668a89db98b080c2138c0096f7e24903de63c95dcf3a42e6a3f9b2d70f5dd16456696dd42af07"] }


Less details
source code | moneroexplorer