Monero Transaction f470aaaa51467ddc478f34edf7bd6f6d1d708f438ce45adca7f3f06cca45d212

Autorefresh is OFF

Tx hash: f470aaaa51467ddc478f34edf7bd6f6d1d708f438ce45adca7f3f06cca45d212

Tx prefix hash: b22b8cd21418e445c4c4b452d629079773841933ff32b5220e507b20b22879d1
Tx public key: e9afe593a13df1925be5ccec8b828057be5e495efc5f41f9585f7a0d400d814e
Payment id: d9b96151df5e963a5d708438346ad435a8bd4599e1b21445ffa2a2b0bca99786

Transaction f470aaaa51467ddc478f34edf7bd6f6d1d708f438ce45adca7f3f06cca45d212 was carried out on the Monero network on 2014-07-18 02:03:51. The transaction has 3158667 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1405649031 Timestamp [UTC]: 2014-07-18 02:03:51 Age [y:d:h:m:s]: 10:137:16:33:30
Block: 133517 Fee (per_kB): 0.010000000000 (0.021244813278) Tx size: 0.4707 kB
Tx version: 1 No of confirmations: 3158667 RingCT/type: no
Extra: 022100d9b96151df5e963a5d708438346ad435a8bd4599e1b21445ffa2a2b0bca9978601e9afe593a13df1925be5ccec8b828057be5e495efc5f41f9585f7a0d400d814e

5 output(s) for total of 30.020000000000 xmr

stealth address amount amount idx tag
00: 3e2729ba4941c906091a8c7a3dd996cc2ea2a7d1b26b0e801878df566606d69b 0.020000000000 200011 of 381492 -
01: bed58dc9409e1302eb8768cf4d354feb83217c0600c4f62c7b21fe07ada08a6c 0.500000000000 135798 of 1118624 -
02: e2a53e8c520c49b4781f7cb96cbf7e5ffcd77fcde811665e06cb308b6628221a 0.500000000000 135799 of 1118624 -
03: 20be624492baf043a6f10b2b94cc2d33f006407706bf1429611077f8ac698824 9.000000000000 11353 of 274259 -
04: e7fcb7fb71f55d92fef57e2f809fb6665c8d225c0c0b79aa93a37910271ab048 20.000000000000 6268 of 78991 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-17 19:25:34 till 2014-07-17 22:43:30; resolution: 0.00 days)

  • |______________________________________________________________________________________________________________________*___________________________________________________|
  • |____________________________________________________*_____________________________________________________________________________________________________________________|

2 inputs(s) for total of 30.030000000000 xmr

key image 00: d7954e792cd7d9ee167a6bb95ad976ad4ec22439cc9dcaf6e26e691e8aca718f amount: 0.030000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 70b8dc9b4c116b408db3995ec4337dfd9c32162aa5eb310cd2c192665d00013d 00133249 1 2/5 2014-07-17 21:43:30 10:137:20:53:51
key image 01: fe4c0dcf1e5a5b61f2ef3ef85bf0ffc384c1c4bbd37a1c4d430cb4a9f99f4597 amount: 30.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3e8f93e3b72a7ba8965798c9ed9d4097491de0b79951c0c82f9884cc7b0cf64b 00133168 1 1/5 2014-07-17 20:25:34 10:137:22:11:47
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 30000000000, "key_offsets": [ 149081 ], "k_image": "d7954e792cd7d9ee167a6bb95ad976ad4ec22439cc9dcaf6e26e691e8aca718f" } }, { "key": { "amount": 30000000000000, "key_offsets": [ 3322 ], "k_image": "fe4c0dcf1e5a5b61f2ef3ef85bf0ffc384c1c4bbd37a1c4d430cb4a9f99f4597" } } ], "vout": [ { "amount": 20000000000, "target": { "key": "3e2729ba4941c906091a8c7a3dd996cc2ea2a7d1b26b0e801878df566606d69b" } }, { "amount": 500000000000, "target": { "key": "bed58dc9409e1302eb8768cf4d354feb83217c0600c4f62c7b21fe07ada08a6c" } }, { "amount": 500000000000, "target": { "key": "e2a53e8c520c49b4781f7cb96cbf7e5ffcd77fcde811665e06cb308b6628221a" } }, { "amount": 9000000000000, "target": { "key": "20be624492baf043a6f10b2b94cc2d33f006407706bf1429611077f8ac698824" } }, { "amount": 20000000000000, "target": { "key": "e7fcb7fb71f55d92fef57e2f809fb6665c8d225c0c0b79aa93a37910271ab048" } } ], "extra": [ 2, 33, 0, 217, 185, 97, 81, 223, 94, 150, 58, 93, 112, 132, 56, 52, 106, 212, 53, 168, 189, 69, 153, 225, 178, 20, 69, 255, 162, 162, 176, 188, 169, 151, 134, 1, 233, 175, 229, 147, 161, 61, 241, 146, 91, 229, 204, 236, 139, 130, 128, 87, 190, 94, 73, 94, 252, 95, 65, 249, 88, 95, 122, 13, 64, 13, 129, 78 ], "signatures": [ "1f4988edd58fc9e4818fdf3cb75c64768d49005d3e7866b26d2b9730820bd30975ffc0cb23a1e2b163a2257961ed4663b40b5a97a7fa3a0eeab5964a9b0a8f0f", "4615356bd030ec58c904d091804527a60844a264e67826ec60cd46f1fee33b0eef6577de6469d9e6e69daa7d2dc42f5bd937def6676022cd026291f484266502"] }


Less details
source code | moneroexplorer