Monero Transaction dffb3be3480c317c8bb2ff03cfa57e353f6870231e89df78b16c799c5ceed70a

Autorefresh is OFF

Tx hash: dffb3be3480c317c8bb2ff03cfa57e353f6870231e89df78b16c799c5ceed70a

Tx prefix hash: fd6b76fd9831c342f31a2299ea4147cccd1e746c1cbcbeaef2b7d7998ccfe48b
Tx public key: 056aaa259341bcad10b8297383e680dfcd4db02089cbf86419ade8bfd43318c4
Payment id: 4bb869ebcce00602946f9349ca3716895b7b0319b11cdc166880a0425fb21cc6

Transaction dffb3be3480c317c8bb2ff03cfa57e353f6870231e89df78b16c799c5ceed70a was carried out on the Monero network on 2016-12-07 03:43:56. The transaction has 2106317 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1481082236 Timestamp [UTC]: 2016-12-07 03:43:56 Age [y:d:h:m:s]: 08:008:12:30:32
Block: 1195829 Fee (per_kB): 0.010000000000 (0.013819163293) Tx size: 0.7236 kB
Tx version: 1 No of confirmations: 2106317 RingCT/type: no
Extra: 01056aaa259341bcad10b8297383e680dfcd4db02089cbf86419ade8bfd43318c40221004bb869ebcce00602946f9349ca3716895b7b0319b11cdc166880a0425fb21cc6de2069e2c0308b621f515a0ba320424e2f487255c0f499ef24a71667134531589cc7

4 output(s) for total of 0.090000000000 xmr

stealth address amount amount idx tag
00: 28671681fe4c85612f1078c966e3bd6ea195a3006353ea766a8be9e05a8f0c95 0.002000000000 79183 of 95916 -
01: d941ceb47ac860edb777fd3ce5ccc6518cd7db993dc21110ebe52f76419a8108 0.008000000000 222938 of 245068 -
02: 48b5420f778c6f447bb14ac000d232c6e013710422e016dcf6644f01609c50c4 0.010000000000 480681 of 502466 -
03: 5a41872770b748b6df8d7e60bca475abd0c7c3bce689d13cdde1b3b512f25e83 0.070000000000 246177 of 263947 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-05 11:23:26 till 2016-12-07 03:48:05; resolution: 5.39 days)

  • |__*_*____________________________________________________________________________________________________________________________________________________________________*|
  • |_*__________*____________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 0.100000000000 xmr

key image 00: 4350f938b50a3ff219d5c0d4e0c4ecff8420a28ff132d57c43457bfcb9226c3d amount: 0.010000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6c520842b1454f9f52e490eef4a02429a9a02819bd8b52dab9573618317b871d 00087123 1 8/14 2014-06-16 02:15:43 10:183:13:58:45
- 01: 1d801ef3119f407d5c9edcc54b9b4fff193c75a1956e131e644d0a3d59de8b71 00098672 1 7/118 2014-06-23 21:58:39 10:175:18:15:49
- 02: c4cba2b08f3ac421bd948229362450a539bdad32174b3aa78f9d317e01a5c222 01195716 3 4/25 2016-12-06 22:40:32 08:008:17:33:56
key image 01: 700d1446880ee6de4148eebff4de091a3b671d4312b47f440d1723236620c22a amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 402bb8da9a47da8e84b2446ba7b8803c5df7b2ae040b4a58a81ec4d259c31790 00071843 1 1/97 2014-06-05 12:23:26 10:194:03:51:02
- 01: b57a89db95133fd5c1587a97906a664a3e002c4d56ac2c2d5a4523ef5e824b22 00160693 1 19/4 2014-08-05 23:13:40 10:132:17:00:48
- 02: dcb0df23d6833c1926ad9b507e42daeb6139cf8de2a41790ede7a53b338b11d3 01195809 3 3/22 2016-12-07 02:48:05 08:008:13:26:23
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 10000000000, "key_offsets": [ 246785, 56823, 177032 ], "k_image": "4350f938b50a3ff219d5c0d4e0c4ecff8420a28ff132d57c43457bfcb9226c3d" } }, { "key": { "amount": 90000000000, "key_offsets": [ 21121, 77375, 191154 ], "k_image": "700d1446880ee6de4148eebff4de091a3b671d4312b47f440d1723236620c22a" } } ], "vout": [ { "amount": 2000000000, "target": { "key": "28671681fe4c85612f1078c966e3bd6ea195a3006353ea766a8be9e05a8f0c95" } }, { "amount": 8000000000, "target": { "key": "d941ceb47ac860edb777fd3ce5ccc6518cd7db993dc21110ebe52f76419a8108" } }, { "amount": 10000000000, "target": { "key": "48b5420f778c6f447bb14ac000d232c6e013710422e016dcf6644f01609c50c4" } }, { "amount": 70000000000, "target": { "key": "5a41872770b748b6df8d7e60bca475abd0c7c3bce689d13cdde1b3b512f25e83" } } ], "extra": [ 1, 5, 106, 170, 37, 147, 65, 188, 173, 16, 184, 41, 115, 131, 230, 128, 223, 205, 77, 176, 32, 137, 203, 248, 100, 25, 173, 232, 191, 212, 51, 24, 196, 2, 33, 0, 75, 184, 105, 235, 204, 224, 6, 2, 148, 111, 147, 73, 202, 55, 22, 137, 91, 123, 3, 25, 177, 28, 220, 22, 104, 128, 160, 66, 95, 178, 28, 198, 222, 32, 105, 226, 192, 48, 139, 98, 31, 81, 90, 11, 163, 32, 66, 78, 47, 72, 114, 85, 192, 244, 153, 239, 36, 167, 22, 103, 19, 69, 49, 88, 156, 199 ], "signatures": [ "4d52ee12538decfcf4517baa9dc664ad6d00d140078bcb1213788bf11c56bc0129df86af715b9585225ca8dfe830930715ca6fe5175193f4d55ea0d0f4782409d30787854516bb91f9e500fc0f6a2b249f73f41b9ffa7ffd7cd8cd0cdbd2200483bb62eac2cbdf5dc96a9a8287e237cd412d5fa4b92d14e9b9edfeac695a6e0552750259b651b3484214e2be496a790ba5c6decfb29a9e1bb0bab92443380e086cc22fd7c4093765d1533225eab031d3045e9a501535d628ff3520f4db03410f", "ea38681ce2f3335524be29d8afafad9ef6ded00a6597a02cf244dbd2ecbaeb0351259ffb9d487252180c3aaccb91319866896dfc7229ab55b5400841b9743c0edfc49da85bd654b27cfcd087cf8d54ee5746a6f176acb4f56eeb2b6ed592df012c8926052a7890b3be91337b28431c55d9dc2652ae1d0f7c4d445f5d6a266405e9ee91a8c3f4d3ce49f0c2e31e374a2bf0259b2023225b6cde110087c2771305e8acb05cbdb3d713529837be5affb0b94186d998baed7e8d2e3908f8dd388a06"] }


Less details
source code | moneroexplorer