Monero Transaction db34132940b42ae848d6341401cd1b88e6e983b3700d06408a70e0c3f53a7750

Autorefresh is OFF

Tx hash: db34132940b42ae848d6341401cd1b88e6e983b3700d06408a70e0c3f53a7750

Tx prefix hash: cedab8227b849392688c929e26159ea4111617765a486ab49f3e2eb50c461fff
Tx public key: b2a57d14e2c61a4b3782ff1e06aadca49a667de98560f5e76b0a3977f2a949c7
Payment id: 6c9472048a3bfc85b5b27e39058d576e1ac56b7686726efbcd74f93392ae029b

Transaction db34132940b42ae848d6341401cd1b88e6e983b3700d06408a70e0c3f53a7750 was carried out on the Monero network on 2014-10-20 00:40:24. The transaction has 3025842 confirmations. Total output fee is 0.137308495898 XMR.

Timestamp: 1413765624 Timestamp [UTC]: 2014-10-20 00:40:24 Age [y:d:h:m:s]: 10:046:08:59:56
Block: 268242 Fee (per_kB): 0.137308495898 (0.148004105052) Tx size: 0.9277 kB
Tx version: 1 No of confirmations: 3025842 RingCT/type: no
Extra: 0221006c9472048a3bfc85b5b27e39058d576e1ac56b7686726efbcd74f93392ae029b01b2a57d14e2c61a4b3782ff1e06aadca49a667de98560f5e76b0a3977f2a949c7

6 output(s) for total of 26.504828110000 xmr

stealth address amount amount idx tag
00: 0f82542f543420c7b06b3b6e9a33d1a5e1e73d54612c06bace359002fc6a1c66 0.004828110000 0 of 1 -
01: 06544f0640dd4d5c470ce7410265a7601593a2eac8e9f09e64b5cf31d7108bc9 0.200000000000 571594 of 1272210 -
02: 03312bf1056e57be346bdac4e969fbf25aa53f9039f9acf9c493e374c252342d 0.300000000000 290659 of 976536 -
03: 151c0664d8e286beac0c36bccfa5b702ba4f0a4118d1010e1c8b048a79e2cf39 1.000000000000 309169 of 874629 -
04: dd469eda31925908b2478a9e7a024414df63c462efe5e4712c28025b967e8a15 5.000000000000 119439 of 255089 -
05: 0d7c389eb0002d48026157b3ad8b3033b2bc23e57ff3c51f1877bcc0c5e728c1 20.000000000000 17679 of 78991 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-10-15 06:12:24 till 2014-10-19 23:03:30; resolution: 0.03 days)

  • |__*_______________________________________________________________________________________________________________________________________________________________________|
  • |________________________________________________________________________________________________________________________________________________________________________*_|
  • |____________________________________________________________________________________________________________________________________________________________________*_____|
  • |___________________________________________________________________________________________________________________________________________________________*______________|
  • |___________________________________________________________________________________________________________________________________________________________*______________|
  • |______________________________________________________________________________________________________________________________________________________________________*___|

6 inputs(s) for total of 26.642136605898 xmr

key image 00: e64ec304d0e3f8bd2675657c900a6936d3d7381482dc3c80a299b0bd1e0d134a amount: 0.042136605898
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a3477411d12532e6485243066910cee5f4286ddac58e95a08361a7f0afec7288 00261500 0 0/4 2014-10-15 07:12:24 10:051:02:27:56
key image 01: e7844018c17303bfe4d5ba8d07c789ca933f0b1548119f4f39a101f53a969377 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 63861670938a62fd13705602e20fd3e17105a319c0d225225cdc93a5e9207016 00268119 0 0/4 2014-10-19 22:03:30 10:046:11:36:50
key image 02: 2650b2864ca381da793aacf63862b9dd937ce48fa3e7e11ccb07742eadbf3b03 amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f20d09325ca30277ea5cb70c72f99fc24bb09c79e832fed0f9a0640b272b61d3 00267963 0 0/4 2014-10-19 19:24:07 10:046:14:16:13
key image 03: 60bf94e9a98a44b0133b114afe962949b2e2609ac99e81e424a8fd0900b607a5 amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 26f16c6fa75b0207852b34cd29d83a08af281aa27d2edd376823b45b5f7996a0 00267619 0 0/4 2014-10-19 13:08:29 10:046:20:31:51
key image 04: 4f413dd79d4a6258d74314c5b1f823ca1cdae95e4176c77a2359248cf0a38c55 amount: 0.600000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a4f3aa31cc791ce30d040a79569ab4bff2596b8d002cd09efa4843d62c5b5d65 00267637 0 0/4 2014-10-19 13:21:42 10:046:20:18:38
key image 05: f07f12610c328d0e000da44e8703361fa7faf4bed47ef0818e5b46c249b26083 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 07db05d1531bc75458173daad52393abdabe167ceeb3661fc5afbc6bb2ab261d 00268056 0 0/4 2014-10-19 20:50:23 10:046:12:49:57
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 42136605898, "key_offsets": [ 0 ], "k_image": "e64ec304d0e3f8bd2675657c900a6936d3d7381482dc3c80a299b0bd1e0d134a" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 312198 ], "k_image": "e7844018c17303bfe4d5ba8d07c789ca933f0b1548119f4f39a101f53a969377" } }, { "key": { "amount": 3000000000000, "key_offsets": [ 93804 ], "k_image": "2650b2864ca381da793aacf63862b9dd937ce48fa3e7e11ccb07742eadbf3b03" } }, { "key": { "amount": 3000000000000, "key_offsets": [ 93404 ], "k_image": "60bf94e9a98a44b0133b114afe962949b2e2609ac99e81e424a8fd0900b607a5" } }, { "key": { "amount": 600000000000, "key_offsets": [ 243938 ], "k_image": "4f413dd79d4a6258d74314c5b1f823ca1cdae95e4176c77a2359248cf0a38c55" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 312119 ], "k_image": "f07f12610c328d0e000da44e8703361fa7faf4bed47ef0818e5b46c249b26083" } } ], "vout": [ { "amount": 4828110000, "target": { "key": "0f82542f543420c7b06b3b6e9a33d1a5e1e73d54612c06bace359002fc6a1c66" } }, { "amount": 200000000000, "target": { "key": "06544f0640dd4d5c470ce7410265a7601593a2eac8e9f09e64b5cf31d7108bc9" } }, { "amount": 300000000000, "target": { "key": "03312bf1056e57be346bdac4e969fbf25aa53f9039f9acf9c493e374c252342d" } }, { "amount": 1000000000000, "target": { "key": "151c0664d8e286beac0c36bccfa5b702ba4f0a4118d1010e1c8b048a79e2cf39" } }, { "amount": 5000000000000, "target": { "key": "dd469eda31925908b2478a9e7a024414df63c462efe5e4712c28025b967e8a15" } }, { "amount": 20000000000000, "target": { "key": "0d7c389eb0002d48026157b3ad8b3033b2bc23e57ff3c51f1877bcc0c5e728c1" } } ], "extra": [ 2, 33, 0, 108, 148, 114, 4, 138, 59, 252, 133, 181, 178, 126, 57, 5, 141, 87, 110, 26, 197, 107, 118, 134, 114, 110, 251, 205, 116, 249, 51, 146, 174, 2, 155, 1, 178, 165, 125, 20, 226, 198, 26, 75, 55, 130, 255, 30, 6, 170, 220, 164, 154, 102, 125, 233, 133, 96, 245, 231, 107, 10, 57, 119, 242, 169, 73, 199 ], "signatures": [ "d9530f3dc4e73296791e376efa81e8b89bc766fd0b44eb816f5a1d91eb11f60abddb16a861c6bccde4c312f9951f8706f4ce3c005121590739de7276f1115607", "6defcff2d0d76b9bcb85cf5e4b5f47ef2a31450444690b21909ab5f2c3c58100d78dc11c3604021bb346babc697eda0d7cff97e55f52e0ae8adf441978397702", "65c56314f1f86ab48b28f95e1062a9f12071aabd238732c62f44a8e7d8f9ac0e3752206585aee84b8e856a9e47bbdb866b1f8e70a1c49e7fc26744af7a862901", "68dc68d8b19d4184aea702b6bb38cf37f1ce790fd998a9ad7afe22aff8e3c409b03da865d102a4dd77216bb1958784a829e727bb85c15abbac8b991a3bc77801", "2fce70399ce84442de319befd19d31eb662adec5e951be8f94975f17ac3b4b021adf80b97f7e2a5ba681380126be33cffccf47c7a5157d55a426074d98099b01", "8ca9acce7ca5480d73ee358941e35548b388ec9e001b518715d15010db7e990369cfcf913ef257a959e7bb96ee057fa28616c3b373aab0c46d860d35b647d506"] }


Less details
source code | moneroexplorer