Monero Transaction eddffc6028bd9cf14392358e7191609b8f4a247f0c575b2fe0eafc9cc4e6f0c0

Autorefresh is OFF

Tx hash: eddffc6028bd9cf14392358e7191609b8f4a247f0c575b2fe0eafc9cc4e6f0c0

Tx prefix hash: d82b093df797c7d78aed27780eba5c1b780c00a2aa8ad877273121f80824df28
Tx public key: 6f83d8fdd149545cc7216242c6e3f8a76f575b146070a3320d38f71f684995d6
Payment id: 32a4aa6e8f84a62e585bfac0dcb9771e159bbc724e1bf38a3e008d3ca600078b

Transaction eddffc6028bd9cf14392358e7191609b8f4a247f0c575b2fe0eafc9cc4e6f0c0 was carried out on the Monero network on 2014-06-16 15:08:52. The transaction has 3291659 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1402931332 Timestamp [UTC]: 2014-06-16 15:08:52 Age [y:d:h:m:s]: 10:290:16:02:27
Block: 88009 Fee (per_kB): 0.005000000000 (0.015753846154) Tx size: 0.3174 kB
Tx version: 1 No of confirmations: 3291659 RingCT/type: no
Extra: 02210032a4aa6e8f84a62e585bfac0dcb9771e159bbc724e1bf38a3e008d3ca600078b016f83d8fdd149545cc7216242c6e3f8a76f575b146070a3320d38f71f684995d6

1 output(s) for total of 0.050000000000 xmr

stealth address amount amount idx tag
00: 30da6f86cf935d71baf569bd78593b49224a80e6de6594f6262f3eccd55836f0 0.050000000000 77216 of 284522 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-16 07:04:08 till 2014-06-16 11:07:40; resolution: 0.00 days)

  • |________________________________________________________________________________________________________________________________*_________________________________________|
  • |__________________________________________*_______________________________________________________________________________________________________________________________|

2 inputs(s) for total of 0.055000000000 xmr

key image 00: 30f117a047b64c087924ff970e0b4155486440ebb98ca04fc81ff656e7ca0638 amount: 0.005000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f43c9522372d4c11ed8feab057593e534d40434b03553af138f81801f2644aa3 00087747 1 4/24 2014-06-16 10:07:40 10:290:21:03:39
key image 01: cb54b6126a2ec6b789b18f8e68d6d1a53928cc027f9d20111341f9033748374d amount: 0.050000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5d1c0ab4198803a3dd0b9144ff5ebaebdf10b52da9e4a59ce487236eab531e15 00087591 1 6/106 2014-06-16 08:04:08 10:290:23:07:11
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000, "key_offsets": [ 143711 ], "k_image": "30f117a047b64c087924ff970e0b4155486440ebb98ca04fc81ff656e7ca0638" } }, { "key": { "amount": 50000000000, "key_offsets": [ 75763 ], "k_image": "cb54b6126a2ec6b789b18f8e68d6d1a53928cc027f9d20111341f9033748374d" } } ], "vout": [ { "amount": 50000000000, "target": { "key": "30da6f86cf935d71baf569bd78593b49224a80e6de6594f6262f3eccd55836f0" } } ], "extra": [ 2, 33, 0, 50, 164, 170, 110, 143, 132, 166, 46, 88, 91, 250, 192, 220, 185, 119, 30, 21, 155, 188, 114, 78, 27, 243, 138, 62, 0, 141, 60, 166, 0, 7, 139, 1, 111, 131, 216, 253, 209, 73, 84, 92, 199, 33, 98, 66, 198, 227, 248, 167, 111, 87, 91, 20, 96, 112, 163, 50, 13, 56, 247, 31, 104, 73, 149, 214 ], "signatures": [ "b9b940db6c75d1971fc59028700b71bd9236efc6cc708f3152940eef04ec5b04d534c21e9b77ead9131e2598c464a4f163d040706b8d8fdaebd50214ba55220f", "89afab31a4270a55cfb36743f983c774b465ddc53399e1db697b91c5b01fc606f03bf530322e42f57027e8da38698cd3144ff5194f0a66fb8e26fc7641421508"] }


Less details
source code | moneroexplorer