Monero Transaction f2b2a287db46840569b4ef372071893dcd6891c51a8831c7eb9a027fde12e693

Autorefresh is OFF

Tx hash: f2b2a287db46840569b4ef372071893dcd6891c51a8831c7eb9a027fde12e693

Tx prefix hash: b6d91dfc01def017ce194837bca3f7fd1e78eb4850932dc6c5b5ef27133632c1
Tx public key: 163cf4a0a72acf10113a08f55456073ecaae28f6609482d90435a1000740d4dc
Payment id: 1b7f8474667f47a0aa6a87c62ffc90be47e31a909ac74c3cbf79612585b604fb

Transaction f2b2a287db46840569b4ef372071893dcd6891c51a8831c7eb9a027fde12e693 was carried out on the Monero network on 2014-07-19 00:56:58. The transaction has 3143376 confirmations. Total output fee is 0.005777820000 XMR.

Timestamp: 1405731418 Timestamp [UTC]: 2014-07-19 00:56:58 Age [y:d:h:m:s]: 10:117:09:00:43
Block: 134876 Fee (per_kB): 0.005777820000 (0.005688930462) Tx size: 1.0156 kB
Tx version: 1 No of confirmations: 3143376 RingCT/type: no
Extra: 0221001b7f8474667f47a0aa6a87c62ffc90be47e31a909ac74c3cbf79612585b604fb01163cf4a0a72acf10113a08f55456073ecaae28f6609482d90435a1000740d4dc

7 output(s) for total of 10.514222180000 xmr

stealth address amount amount idx tag
00: a765fec3b14124554faf6a88399b6dc40a57bf47af05fcb064b10b2896390f71 0.004222180000 0 of 1 -
01: 93df76565274435eeb82dfd8ddcf4103c708d745d0f0db358420113c2ea95b1a 0.050000000000 106434 of 284521 -
02: 41f6b34c2445d13022f90f3213dfeb6437f3787da308a03b06baa4e4d7a37f49 0.060000000000 93083 of 264760 -
03: d2bd388b7e740ffd083602bfd1bce62b9bc7dc4e258687f8cb654ca9ae5784b3 0.100000000000 292653 of 982315 -
04: a47be0d54a5dcdee1dd1fe69e873a14644e8e264c605223116daf6d1d9debbf8 0.300000000000 106911 of 976536 -
05: 1ab1c3152c3848dbf3828b1eb4fc40206a67cac8493aeb171e296c65345fad59 1.000000000000 114625 of 874629 -
06: 9c2facc76e7fc003bba0790c34b291b7ac2aa98b94be22c31d0e35add319fadb 9.000000000000 11596 of 274259 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-04-28 15:23:46 till 2014-07-19 01:20:40; resolution: 0.48 days)

  • |_______________________________________________________________________________________________*_________________________________________________________________________*|
  • |___________________________________________________________________________*_____________________________________________________________________________________________*|
  • |__________________________________________________________________________________*______________________________________________________________________________________*|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|

4 inputs(s) for total of 10.520000000000 xmr

key image 00: c46c80f680c10a0ab167db9ff18f105802c51f8d780969e170c937a08bd9309c amount: 0.010000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 08b378cd1b83d49c82cfa9025e3b2f4907e18a202d5e2479289029a62a1a125c 00083082 1 2/126 2014-06-13 06:45:10 10:153:03:12:31
- 01: 09870d2addc63079557f4b37e570bb64b32ec036ba528b5f1c98208f78da1409 00134826 2 3/7 2014-07-18 23:53:29 10:117:10:04:12
key image 01: bc5464f1973ed04a2b043dfa40a33f297d04ca5ac9b6ae2b26014a6bef098a3b amount: 0.010000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 62e73463e6ac6366fbff1380a5ec247bdccd5c92bb7b9ca94797509d2e61147a 00069312 1 5/108 2014-06-03 17:47:40 10:162:16:10:01
- 01: f146fb09ea23f100ec5c8178bca0c05383d66878b7330da8faab2d9a05e58cfa 00134803 0 0/5 2014-07-18 23:34:10 10:117:10:23:31
key image 02: 7c6203425bb597113507f7af9942e7a7c94799653e4b8b713ffd7e2b5fb4d953 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b9425a9fd778e3e33533ca7cf6c00e5cf4a97bc41238daedfca14763f798ea34 00073844 1 23/103 2014-06-06 21:31:06 10:159:12:26:35
- 01: a030b381d406df591c89897fbb3bc88b5e2137f718e61c482f5875fbc2e1c588 00134845 2 1/7 2014-07-19 00:20:40 10:117:09:37:01
key image 03: c9967da33f9aa0ea5389e96d8c78d61edd6169927b99eafe7d0129a52e749a46 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 29c86978ac6bb277074f0003765fe6588f5ffc4f9d009fb066d47248c72a47de 00015501 0 0/9 2014-04-28 16:23:46 10:198:17:33:55
- 01: 6e8367546b9699f97d760c063c47e18b3d22557bfcd8f458a1f7bfdb6f1cc419 00134774 0 0/4 2014-07-18 23:05:46 10:117:10:51:55
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 10000000000, "key_offsets": [ 187190, 127704 ], "k_image": "c46c80f680c10a0ab167db9ff18f105802c51f8d780969e170c937a08bd9309c" } }, { "key": { "amount": 10000000000, "key_offsets": [ 75138, 239734 ], "k_image": "bc5464f1973ed04a2b043dfa40a33f297d04ca5ac9b6ae2b26014a6bef098a3b" } }, { "key": { "amount": 500000000000, "key_offsets": [ 20094, 119239 ], "k_image": "7c6203425bb597113507f7af9942e7a7c94799653e4b8b713ffd7e2b5fb4d953" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 15487, 137325 ], "k_image": "c9967da33f9aa0ea5389e96d8c78d61edd6169927b99eafe7d0129a52e749a46" } } ], "vout": [ { "amount": 4222180000, "target": { "key": "a765fec3b14124554faf6a88399b6dc40a57bf47af05fcb064b10b2896390f71" } }, { "amount": 50000000000, "target": { "key": "93df76565274435eeb82dfd8ddcf4103c708d745d0f0db358420113c2ea95b1a" } }, { "amount": 60000000000, "target": { "key": "41f6b34c2445d13022f90f3213dfeb6437f3787da308a03b06baa4e4d7a37f49" } }, { "amount": 100000000000, "target": { "key": "d2bd388b7e740ffd083602bfd1bce62b9bc7dc4e258687f8cb654ca9ae5784b3" } }, { "amount": 300000000000, "target": { "key": "a47be0d54a5dcdee1dd1fe69e873a14644e8e264c605223116daf6d1d9debbf8" } }, { "amount": 1000000000000, "target": { "key": "1ab1c3152c3848dbf3828b1eb4fc40206a67cac8493aeb171e296c65345fad59" } }, { "amount": 9000000000000, "target": { "key": "9c2facc76e7fc003bba0790c34b291b7ac2aa98b94be22c31d0e35add319fadb" } } ], "extra": [ 2, 33, 0, 27, 127, 132, 116, 102, 127, 71, 160, 170, 106, 135, 198, 47, 252, 144, 190, 71, 227, 26, 144, 154, 199, 76, 60, 191, 121, 97, 37, 133, 182, 4, 251, 1, 22, 60, 244, 160, 167, 42, 207, 16, 17, 58, 8, 245, 84, 86, 7, 62, 202, 174, 40, 246, 96, 148, 130, 217, 4, 53, 161, 0, 7, 64, 212, 220 ], "signatures": [ "5bb2f6dabebec195730a6a3754611b6c3df37a8b66b9753a77b629ec4a2d4705b0d370d6f98dab81c72f9e67d78037cc8583b525c6b54353a402b392ab17e109a74068ec9520ba294b78f53e4d00e3249fdc151fd1a1ae3dba4d3957c027e20864be97d30adea548350b15b9707386104abc31aed0d14afd893d18b4fd58950c", "a48c493ce03f88a3a5bca083091860af6ac7cc38881834ba0b6856bb12e4b501e0779fc9cff1624794494af39493c3ee50499d48d328f5f6365670069a847b080ad151ec0fce20412a15a851774a50fb0a0c0b1fd8a85f65845530750ffff5005c0787c1725bb0e4817a65d5702f58f7f38c4a9e9e41954f392750ee49e8940c", "d27cdd2df634a57f8c39221b2431e753b3cfb78e62427510e80fdae8a5695a02c6605b96fdfa155e4ca12398b58153e1735297ccca52ed3252c677e4d8d33c04b296cb5659ca1008224764cf44641932f6ca9dc7c7f8f79e7a900703d9abf5021b61351e925d0b474064d2a0328c340680220f4434ba21d75cc55a932713ac00", "7b99f31c5dcaea4d0d32f9a8c2cd3b81e66ee38979d23a6fdd1f488f715fd303b4f0420bed92d55401ccc028abcc0c2181ad6c5600da602b6a03613182929609e9262da65fda4b29c6749979385286fe10e7e274d6713f726e397ba6bdcc2d0bbf3eb96e8951689cc7c520872c26472b07d24e15543b8014391e61ecd4384b0d"] }


Less details
source code | moneroexplorer