Monero Transaction ef2a92aa202e865f32843925e0eafce81480d974236e0f3194464394ac184d09

Autorefresh is OFF

Tx hash: ef2a92aa202e865f32843925e0eafce81480d974236e0f3194464394ac184d09

Tx prefix hash: dea698db2929d6d60a458547b4333296e3d8bada0bb8f625ccf1537217299905
Tx public key: ad64199322055fdcfa3857300462c8a77f519103ecb1ceee431c2930e0563ca9
Payment id: cd30644fdc7d428ea421854eadbdfd59ffff6b2bcc86aa396d6e7ff921c290e4

Transaction ef2a92aa202e865f32843925e0eafce81480d974236e0f3194464394ac184d09 was carried out on the Monero network on 2014-11-21 07:28:04. The transaction has 2995745 confirmations. Total output fee is 0.020000000000 XMR.

Timestamp: 1416554884 Timestamp [UTC]: 2014-11-21 07:28:04 Age [y:d:h:m:s]: 10:036:06:08:27
Block: 314273 Fee (per_kB): 0.020000000000 (0.024236686391) Tx size: 0.8252 kB
Tx version: 1 No of confirmations: 2995745 RingCT/type: no
Extra: 022100cd30644fdc7d428ea421854eadbdfd59ffff6b2bcc86aa396d6e7ff921c290e401ad64199322055fdcfa3857300462c8a77f519103ecb1ceee431c2930e0563ca9

6 output(s) for total of 16.840000000000 xmr

stealth address amount amount idx tag
00: f444b354e275ac467af57d1f4be90619da3fa4ac7d66d3e2d8be1f6b34aa5bc5 0.040000000000 146620 of 294095 -
01: cc182e5b500b63a5af13479a50ff91c0ff2f15d231ff90cb5d94171200312e29 0.200000000000 630993 of 1272211 -
02: ba1817c6b803542efbbf6362aac1c71befc70f2e0a9b33760ce87d4a5abe1dcd 0.600000000000 282847 of 650760 -
03: 56cc288ec96389306bc3dc855cd412433ff3560d76142bcd0a3083624d6edcfe 1.000000000000 343004 of 874630 -
04: 9f1c8bc9a408e2010f35dfdb3a271724b06e68393b2c6addb382289ccbcf9024 5.000000000000 125530 of 255089 -
05: 87ccfbf4d86c9a46342c1dd3b53176bef8e96cbda9ea7a5a0bfcd564d12db998 10.000000000000 365127 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-11-20 20:50:57 till 2014-11-21 00:00:40; resolution: 0.00 days)

  • |_________________________________________________________________________________________________*________________________________________________________________________|
  • |________________________________________________________________________________________*_________________________________________________________________________________|
  • |_________________________________________________________________________________________________*________________________________________________________________________|
  • |____________________________________________________________________________________________________________________*_____________________________________________________|
  • |______________________________________________________*___________________________________________________________________________________________________________________|

5 inputs(s) for total of 16.860000000000 xmr

key image 00: 0aaa72bfa13e5b7a4651b72924389eab314ae5f5882a3a836a4308d1aa0a5be9 amount: 9.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e08ac24279526fed95e6e088fbcec0cdac35dd3a85962d4c6c33f1dda7a9e613 00313727 1 7/5 2014-11-20 22:39:29 10:036:14:57:02
key image 01: 95027feb151e32fc17539427ce66bcb50fe7f023564d836522d4a78b693d4748 amount: 0.060000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 28174ae96c82bd203ae0193ade3d2414e48de0d8bb98d8150c7d2922fb3a986d 00313721 1 17/95 2014-11-20 22:28:57 10:036:15:07:34
key image 02: 8e8f2f05c4b45b14c4be41267c7939f27c626bd36da03d278d69be6071fbb4b6 amount: 0.800000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 74b87245410ea5b8a184068a6051d6579a9f180457b4af554c87ec3260303ad1 00313727 1 1/6 2014-11-20 22:39:29 10:036:14:57:02
key image 03: 6324f1d2e7b73685ab429e196afe4c063a857d8c632bf276477cd9b87d79e714 amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e79cd80e3f036b6d2baf82d2d2f45217f832af8d25c215ea005edfb7b9ef8dbb 00313742 1 1/5 2014-11-20 23:00:40 10:036:14:35:51
key image 04: 303c2c03e82cf443751c70b5a162872d5654da8b684afe629cccebb07478aa1a amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d00d25279e32a01d0b37ae28333908969698e728ee01625814d19996b2029193 00313678 0 0/3 2014-11-20 21:50:57 10:036:15:45:34
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 9000000000000, "key_offsets": [ 26720 ], "k_image": "0aaa72bfa13e5b7a4651b72924389eab314ae5f5882a3a836a4308d1aa0a5be9" } }, { "key": { "amount": 60000000000, "key_offsets": [ 117089 ], "k_image": "95027feb151e32fc17539427ce66bcb50fe7f023564d836522d4a78b693d4748" } }, { "key": { "amount": 800000000000, "key_offsets": [ 201832 ], "k_image": "8e8f2f05c4b45b14c4be41267c7939f27c626bd36da03d278d69be6071fbb4b6" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 132364 ], "k_image": "6324f1d2e7b73685ab429e196afe4c063a857d8c632bf276477cd9b87d79e714" } }, { "key": { "amount": 3000000000000, "key_offsets": [ 147180 ], "k_image": "303c2c03e82cf443751c70b5a162872d5654da8b684afe629cccebb07478aa1a" } } ], "vout": [ { "amount": 40000000000, "target": { "key": "f444b354e275ac467af57d1f4be90619da3fa4ac7d66d3e2d8be1f6b34aa5bc5" } }, { "amount": 200000000000, "target": { "key": "cc182e5b500b63a5af13479a50ff91c0ff2f15d231ff90cb5d94171200312e29" } }, { "amount": 600000000000, "target": { "key": "ba1817c6b803542efbbf6362aac1c71befc70f2e0a9b33760ce87d4a5abe1dcd" } }, { "amount": 1000000000000, "target": { "key": "56cc288ec96389306bc3dc855cd412433ff3560d76142bcd0a3083624d6edcfe" } }, { "amount": 5000000000000, "target": { "key": "9f1c8bc9a408e2010f35dfdb3a271724b06e68393b2c6addb382289ccbcf9024" } }, { "amount": 10000000000000, "target": { "key": "87ccfbf4d86c9a46342c1dd3b53176bef8e96cbda9ea7a5a0bfcd564d12db998" } } ], "extra": [ 2, 33, 0, 205, 48, 100, 79, 220, 125, 66, 142, 164, 33, 133, 78, 173, 189, 253, 89, 255, 255, 107, 43, 204, 134, 170, 57, 109, 110, 127, 249, 33, 194, 144, 228, 1, 173, 100, 25, 147, 34, 5, 95, 220, 250, 56, 87, 48, 4, 98, 200, 167, 127, 81, 145, 3, 236, 177, 206, 238, 67, 28, 41, 48, 224, 86, 60, 169 ], "signatures": [ "65f461189b03d5a38abd74bb76692577657dd9ab53c7feae2863dc75e61cb50f3059423ac87d797ab1e71630fb8d9022c20a86b04c71e66c0a3682de99bd000e", "337bfc58cbcc2e0643b13c3825f1c092de753d0d4e1afee91e34dc528479c10ea71c81923e8e814af03ef539ebac0b52639b401387da5e13ef85b58f7efd780a", "6d655ea4eebc29a00e7b6a3fc6e06e468487feccafca797da2af1b4c0459ee0b73009a08cfa693c2878dc084fe048627bd3e1db0e8726cfaad969073f6735105", "5713b170515bd12d11458b2aae587300e264817590ff7841347833544836c60ed8b7cbc58dbcbee58af18a9b91d48571cd2edf2c6629fe4c33c0845b8e4deb09", "5cd50effa0473d41772c8e85589d6948a9b72b2a3f2cbcdd1ef6fd4190a64703818f46e87e8432f88118e5767dcf2f75305741cace01a39fb5bdf57bc2633f05"] }


Less details
source code | moneroexplorer