Monero Transaction dd4c92366147c76ad61027ba39799d73fafcb5d5c91948fe25f046fbd2078afb

Autorefresh is OFF

Tx hash: dd4c92366147c76ad61027ba39799d73fafcb5d5c91948fe25f046fbd2078afb

Tx prefix hash: 71fce9a4254d7fdec66052c6b11230fa0a92d414c570268951da7596713a6d7b
Tx public key: 31629955f6d75dd229ea8a3d6fbd3ed869d73da6464840500fc0aeed3cc859f3
Payment id: 6b085a6fdf694303f4c874db55efe8fc52e48a47bd27651a7294457495c5edba

Transaction dd4c92366147c76ad61027ba39799d73fafcb5d5c91948fe25f046fbd2078afb was carried out on the Monero network on 2014-10-15 03:30:35. The transaction has 3040047 confirmations. Total output fee is 0.128633796985 XMR.

Timestamp: 1413343835 Timestamp [UTC]: 2014-10-15 03:30:35 Age [y:d:h:m:s]: 10:061:07:54:33
Block: 261234 Fee (per_kB): 0.128633796985 (0.239928976526) Tx size: 0.5361 kB
Tx version: 1 No of confirmations: 3040047 RingCT/type: no
Extra: 0221006b085a6fdf694303f4c874db55efe8fc52e48a47bd27651a7294457495c5edba0131629955f6d75dd229ea8a3d6fbd3ed869d73da6464840500fc0aeed3cc859f3

4 output(s) for total of 12.916397760000 xmr

stealth address amount amount idx tag
00: 714057bf32e39ff0c92e8d28c85c907d69cd7e32bdc5f6df5aa426dd1ea48229 0.016397760000 0 of 1 -
01: 011695d3f2d683265481c2f1b8e0f4e93dfe64361c24e7ec233550af5f25989e 0.900000000000 145335 of 454894 -
02: e509aa1f02e0276073b418da7ea4a863237afec4f2be786609e45fca826f30d6 2.000000000000 116319 of 434058 -
03: a47f7b3a202629b43bd7f0c8428268de5ef8ce0033ffb2d399015c69966047f3 10.000000000000 304325 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-10-04 11:31:23 till 2014-10-15 03:18:07; resolution: 0.06 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_________________________________________________________________________________________________________________________________________________________________________*|

3 inputs(s) for total of 13.045031556985 xmr

key image 00: 2db2c7326e7d5ce46970122cf908e89bc9c7efeabde333a26f597f9140c9daa1 amount: 0.045031556985
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c9c1f93be7dd69f79fa08e4ae733fc4e49edb913bdbe5f08d5d5a4f1155738b1 00246122 0 0/4 2014-10-04 12:31:23 10:071:22:53:45
key image 01: 3bfb3363d167dfdc93103c3ac121b3ec338d070ac02f31f1e13b6b22771c1ef6 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a1d59f28b4bdd5bc5377a4676e9ae6869d96c4576bba1a7c7b731070be7763e4 00261164 0 0/4 2014-10-15 02:18:07 10:061:09:07:01
key image 02: f9acd5c824ea702969c47c5f46be554f9007c0baccc80489c1dc906b61d0da31 amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 037a1ba6ab799395a90f53fd8c37b895a6e8166880d72503dcd7298e58107832 00261140 0 0/4 2014-10-15 01:52:18 10:061:09:32:50
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 45031556985, "key_offsets": [ 0 ], "k_image": "2db2c7326e7d5ce46970122cf908e89bc9c7efeabde333a26f597f9140c9daa1" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 304242 ], "k_image": "3bfb3363d167dfdc93103c3ac121b3ec338d070ac02f31f1e13b6b22771c1ef6" } }, { "key": { "amount": 3000000000000, "key_offsets": [ 86000 ], "k_image": "f9acd5c824ea702969c47c5f46be554f9007c0baccc80489c1dc906b61d0da31" } } ], "vout": [ { "amount": 16397760000, "target": { "key": "714057bf32e39ff0c92e8d28c85c907d69cd7e32bdc5f6df5aa426dd1ea48229" } }, { "amount": 900000000000, "target": { "key": "011695d3f2d683265481c2f1b8e0f4e93dfe64361c24e7ec233550af5f25989e" } }, { "amount": 2000000000000, "target": { "key": "e509aa1f02e0276073b418da7ea4a863237afec4f2be786609e45fca826f30d6" } }, { "amount": 10000000000000, "target": { "key": "a47f7b3a202629b43bd7f0c8428268de5ef8ce0033ffb2d399015c69966047f3" } } ], "extra": [ 2, 33, 0, 107, 8, 90, 111, 223, 105, 67, 3, 244, 200, 116, 219, 85, 239, 232, 252, 82, 228, 138, 71, 189, 39, 101, 26, 114, 148, 69, 116, 149, 197, 237, 186, 1, 49, 98, 153, 85, 246, 215, 93, 210, 41, 234, 138, 61, 111, 189, 62, 216, 105, 215, 61, 166, 70, 72, 64, 80, 15, 192, 174, 237, 60, 200, 89, 243 ], "signatures": [ "ca3f0d7ae86602f2781850e475120a7ae0ee02e41813a82d884092d85e8b4707e7bbe7ae9dfe09834dc06e376281261d325a20412db81176a490cd750aade809", "1ed216e4923fc46b621a24c481a930ef002438084fe8757b3c4730a9e8d09002ab95ce2762014b632c9f0fe3a69543e3377ba7c1a9017302674dab44e8c6f600", "d58138adb12fa66d4d26dc2db5a6d2db9e97230b9b7da22caff6049da9d59302bb853a3e48a54f6839aff26a4ea576e0eb9a102e4234da09e4e6cb175beee40e"] }


Less details
source code | moneroexplorer