Monero Transaction f0fbfad5bb00baee868f216a1aaf6b21e57d62a8610ace0a54d4ad9cf3f6738c

Autorefresh is OFF

Tx hash: f0fbfad5bb00baee868f216a1aaf6b21e57d62a8610ace0a54d4ad9cf3f6738c

Tx prefix hash: 9cb3cc99dee2a14cdc1231459f77647c0b4700cb44cc5232be1d709f1d7312ba
Tx public key: d7fa4b56c2a24979aba2e7a55b45700e092347aaaf36c5c8087784976a5ede47
Payment id: 23d21077f24cc972e819301bc02467872ce151853b87d1576c9974af0efac323

Transaction f0fbfad5bb00baee868f216a1aaf6b21e57d62a8610ace0a54d4ad9cf3f6738c was carried out on the Monero network on 2014-07-19 19:09:50. The transaction has 3164814 confirmations. Total output fee is 0.005102014721 XMR.

Timestamp: 1405796990 Timestamp [UTC]: 2014-07-19 19:09:50 Age [y:d:h:m:s]: 10:148:00:35:49
Block: 136007 Fee (per_kB): 0.005102014721 (0.009621478958) Tx size: 0.5303 kB
Tx version: 1 No of confirmations: 3164814 RingCT/type: no
Extra: 02210023d21077f24cc972e819301bc02467872ce151853b87d1576c9974af0efac32301d7fa4b56c2a24979aba2e7a55b45700e092347aaaf36c5c8087784976a5ede47

4 output(s) for total of 3.015000000000 xmr

stealth address amount amount idx tag
00: e387fdf3e52da523680ad9e0cac0571e4950e2517b0566be3aad6a56857c0797 0.005000000000 191110 of 308585 -
01: 07c19f2579aab44a032c2419107e718874be87a79c997a16ea2c9467aaf31596 0.010000000000 315241 of 502466 -
02: 59439a5c889ea450d08e0999b02fd6b357e731d7d0666a25eae590aa560d7759 1.000000000000 116540 of 874629 -
03: 8ba7264fd644c56d41bf4fab32a6e7f328e547b9725a361bbe82d1e1cfcca753 2.000000000000 46992 of 434057 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-19 08:02:08 till 2014-07-19 10:02:08; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|

3 inputs(s) for total of 3.020102014721 xmr

key image 00: a8fd076dd4b9f918a6cecefb433142832dfc9adace76c904ef0a2447927da2a6 amount: 0.000102014721
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a50e3c80024374ff83f95b0abf4818d7ad45163e02f42c4d6de4b6cf39f93550 00135363 1 1/8 2014-07-19 09:02:08 10:148:10:43:31
key image 01: cfd9d209527858166a23dc1c5b8d1c985f952b94050bd0337e1ccb19984d8fe0 amount: 0.020000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: bfa438a496dc39df3af2f4eab265f7b484e3aa94b00a027d97e27590dc88f45e 00135363 1 1/8 2014-07-19 09:02:08 10:148:10:43:31
key image 02: 71d15e806245d0e1abd447a7125f5f079fe9f41a078ec05c89a7f752b6e171f8 amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0593242f02af1af760665a54776308263d42597f325793ac0d56c70c57646d86 00135363 1 1/8 2014-07-19 09:02:08 10:148:10:43:31
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 102014721, "key_offsets": [ 0 ], "k_image": "a8fd076dd4b9f918a6cecefb433142832dfc9adace76c904ef0a2447927da2a6" } }, { "key": { "amount": 20000000000, "key_offsets": [ 200705 ], "k_image": "cfd9d209527858166a23dc1c5b8d1c985f952b94050bd0337e1ccb19984d8fe0" } }, { "key": { "amount": 3000000000000, "key_offsets": [ 30245 ], "k_image": "71d15e806245d0e1abd447a7125f5f079fe9f41a078ec05c89a7f752b6e171f8" } } ], "vout": [ { "amount": 5000000000, "target": { "key": "e387fdf3e52da523680ad9e0cac0571e4950e2517b0566be3aad6a56857c0797" } }, { "amount": 10000000000, "target": { "key": "07c19f2579aab44a032c2419107e718874be87a79c997a16ea2c9467aaf31596" } }, { "amount": 1000000000000, "target": { "key": "59439a5c889ea450d08e0999b02fd6b357e731d7d0666a25eae590aa560d7759" } }, { "amount": 2000000000000, "target": { "key": "8ba7264fd644c56d41bf4fab32a6e7f328e547b9725a361bbe82d1e1cfcca753" } } ], "extra": [ 2, 33, 0, 35, 210, 16, 119, 242, 76, 201, 114, 232, 25, 48, 27, 192, 36, 103, 135, 44, 225, 81, 133, 59, 135, 209, 87, 108, 153, 116, 175, 14, 250, 195, 35, 1, 215, 250, 75, 86, 194, 162, 73, 121, 171, 162, 231, 165, 91, 69, 112, 14, 9, 35, 71, 170, 175, 54, 197, 200, 8, 119, 132, 151, 106, 94, 222, 71 ], "signatures": [ "04c303327d4eec9f97a4a0d984ef0baf58491571793a07739c413b0f9c917b048befb104873fa58a8d0cbcfe13dd9675ddd231bf205d246d50fcfa5e53457505", "bcaf694624baa1c48f70410c82b7bee95671daec03a3678ca9d05d6249e7e8076355cf0d8e0f2dc0d9cad6d4be93a3e5b424becfa5f115be32f46dcbeeff6305", "55028e8cc22e0425925c8bd6d93c26c05337af60d17b310ae3371c71feb37c0ff42d8e4b4005497a58437d7cadbfea3a01140474b0893b7e6b04a29a2a1ef80f"] }


Less details
source code | moneroexplorer