Monero Transaction f31dd31856b77ffb3feb34e90715512f3816473e4f19480c9ddacc74301d4517

Autorefresh is OFF

Tx hash: f31dd31856b77ffb3feb34e90715512f3816473e4f19480c9ddacc74301d4517

Tx prefix hash: 68b629c35b78d69677b55c436723e7d9daa14ecca644efb0bab73bedd1b0c40c
Tx public key: ac42582a08e2e9f92d0295b7f8b0077edb812b2145e9eef75f5b7e89807fc0e3

Transaction f31dd31856b77ffb3feb34e90715512f3816473e4f19480c9ddacc74301d4517 was carried out on the Monero network on 2014-06-12 03:03:26. The transaction has 3197054 confirmations. Total output fee is 0.005027857931 XMR.

Timestamp: 1402542206 Timestamp [UTC]: 2014-06-12 03:03:26 Age [y:d:h:m:s]: 10:154:12:43:05
Block: 81368 Fee (per_kB): 0.005027857931 (0.006332750949) Tx size: 0.7939 kB
Tx version: 1 No of confirmations: 3197054 RingCT/type: no
Extra: 01ac42582a08e2e9f92d0295b7f8b0077edb812b2145e9eef75f5b7e89807fc0e3

9 output(s) for total of 16.995457026390 xmr

stealth address amount amount idx tag
00: 9fbb89789c7e5307240f86daae6023c8d8d88ffaad092ffb33ba718af5fa7d04 0.000151702269 0 of 1 -
01: a146aa12bdfe640fed9d76e7812bf1c9ce021a60b50fc0c76d9e499ae4109d6e 0.002305324121 0 of 1 -
02: 3190fa8c3bc66ebb1d33091a0faf7241eda18fa1bc4d693415bde42ed3847e8b 0.006000000000 88672 of 256624 -
03: 8c7032c85bed3a8eb3f1205668d1ad2bb88c854492bf1c6e7f76bf88a720b109 0.007000000000 83917 of 247340 -
04: 80678e65dbb0d548e7380f5c32fcf063a3203eb39d0c1553774e5c69a19c8a73 0.080000000000 38151 of 269576 -
05: eb45d19d40056d9302be7da6ddda64cb084341b3b7400f1f396b1ac8bb384e6f 0.300000000000 31095 of 976536 -
06: ee2f72a174f101e251a6596df3c141d2de9c4cb979797058a084d5f7ec46ddb4 0.600000000000 17182 of 650760 -
07: fb078aba896cdf0e25ffc1de52ea1960273d16cda753b2a802640256998bda5d 6.000000000000 44948 of 207703 -
08: b4b629823ee1c1d1cc699b63f626739b611cd3bdade48d7217a186463853e0db 10.000000000000 84274 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-11 23:56:10 till 2014-06-12 02:54:27; resolution: 0.00 days)

  • |_____________________________________________________________*____________________________________________________________________________________________________________|
  • |_____________________________________________________________*____________________________________________________________________________________________________________|
  • |_________________________________________________________*________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________*________________________________________________________|

4 inputs(s) for total of 17.000484884321 xmr

key image 00: bc25825f1e621c75676af05e071c6e3a9f73ee18a1ede2dae496422900301bed amount: 0.000484884321
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9077e45e8c94fc4ab8204675a2259b948c02b52944d1ec9f1125726e0bc9797a 00081235 0 0/5 2014-06-12 01:00:23 10:154:14:46:08
key image 01: 23d4fce065c6cb81a507f05352e98308e88d819507ab35aac29f5a699da1e0c6 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b822b63ed45ffbd5605ea19d89271f4c07bd569cd5499595d29f2cc55b27688b 00081235 0 0/5 2014-06-12 01:00:23 10:154:14:46:08
key image 02: 0dac0394d95650db32b80f058b47623561dbec1ef0e7c871e770016f6fbdf256 amount: 6.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: cc704286db6f86510bb2fc095e0f21e479940d29f19e53785fd972a9ce46bbc3 00081227 0 0/6 2014-06-12 00:56:10 10:154:14:50:21
key image 03: 5f9b1f5d8090afb7b3ecd3e4120445ef0550e3acde5635d81714bdbce02be25a amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7d70fbad1245630a1052e73a78eea9e351d24a64b2d4205a846161ba5313a310 00081291 1 7/10 2014-06-12 01:54:27 10:154:13:52:04
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 484884321, "key_offsets": [ 0 ], "k_image": "bc25825f1e621c75676af05e071c6e3a9f73ee18a1ede2dae496422900301bed" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 84108 ], "k_image": "23d4fce065c6cb81a507f05352e98308e88d819507ab35aac29f5a699da1e0c6" } }, { "key": { "amount": 6000000000000, "key_offsets": [ 44794 ], "k_image": "0dac0394d95650db32b80f058b47623561dbec1ef0e7c871e770016f6fbdf256" } }, { "key": { "amount": 1000000000000, "key_offsets": [ 17550 ], "k_image": "5f9b1f5d8090afb7b3ecd3e4120445ef0550e3acde5635d81714bdbce02be25a" } } ], "vout": [ { "amount": 151702269, "target": { "key": "9fbb89789c7e5307240f86daae6023c8d8d88ffaad092ffb33ba718af5fa7d04" } }, { "amount": 2305324121, "target": { "key": "a146aa12bdfe640fed9d76e7812bf1c9ce021a60b50fc0c76d9e499ae4109d6e" } }, { "amount": 6000000000, "target": { "key": "3190fa8c3bc66ebb1d33091a0faf7241eda18fa1bc4d693415bde42ed3847e8b" } }, { "amount": 7000000000, "target": { "key": "8c7032c85bed3a8eb3f1205668d1ad2bb88c854492bf1c6e7f76bf88a720b109" } }, { "amount": 80000000000, "target": { "key": "80678e65dbb0d548e7380f5c32fcf063a3203eb39d0c1553774e5c69a19c8a73" } }, { "amount": 300000000000, "target": { "key": "eb45d19d40056d9302be7da6ddda64cb084341b3b7400f1f396b1ac8bb384e6f" } }, { "amount": 600000000000, "target": { "key": "ee2f72a174f101e251a6596df3c141d2de9c4cb979797058a084d5f7ec46ddb4" } }, { "amount": 6000000000000, "target": { "key": "fb078aba896cdf0e25ffc1de52ea1960273d16cda753b2a802640256998bda5d" } }, { "amount": 10000000000000, "target": { "key": "b4b629823ee1c1d1cc699b63f626739b611cd3bdade48d7217a186463853e0db" } } ], "extra": [ 1, 172, 66, 88, 42, 8, 226, 233, 249, 45, 2, 149, 183, 248, 176, 7, 126, 219, 129, 43, 33, 69, 233, 238, 247, 95, 91, 126, 137, 128, 127, 192, 227 ], "signatures": [ "f0d6a295a6d454c4bf67c8b8be474908856fbd6960f199eb7cf1bc079d01110952087cfe582897b2481120d1bc8534c5b65813c26274419839ffbcd57cae3407", "b3877c9db27aef061ebf3bf6d5e74cb4c7373f42da1af7522a46431796ee4e01bfd0bb1b8e3d2e0752cd6510f42f7cd9bef295b58b4bcb29af1b88cf98b90208", "eb6ecefc9c2a2891d90936f67e2645f17710d9b5d67b92a99168f479da12100610783b897b91f43c46781b8ccf364169b78818b7c1d70ff995925a0297bfa20a", "8c7384da24c875eb6d0d887329bda1eb8440e17659adc1a47c657725a15070097aa92cccd139bd745056d28811c55c03bb858d205cedba752c7fe2982c65ef0e"] }


Less details
source code | moneroexplorer