Monero Transaction faf9f1d04884287a53e52b5a9c3381a66c8a87d77945e68af40c6a3779287d0e

Autorefresh is OFF

Tx hash: faf9f1d04884287a53e52b5a9c3381a66c8a87d77945e68af40c6a3779287d0e

Tx prefix hash: 0ce6b6b9d54d718d314c91c6b11bae92b91fcd623af4166087a0ce05bc07e57a
Tx public key: 22d55c9d212484ad416e70e4a397e4fdc44c18cf2b6bc3931d905c70a48a87eb
Payment id: 00313f6e048ace65994f9ba7ce26957ddc2798a1342e627c5ae04294ce3407f8

Transaction faf9f1d04884287a53e52b5a9c3381a66c8a87d77945e68af40c6a3779287d0e was carried out on the Monero network on 2014-06-06 07:05:45. The transaction has 3219705 confirmations. Total output fee is 0.000002000000 XMR.

Timestamp: 1402038345 Timestamp [UTC]: 2014-06-06 07:05:45 Age [y:d:h:m:s]: 10:180:03:31:30
Block: 72977 Fee (per_kB): 0.000002000000 (0.000002126687) Tx size: 0.9404 kB
Tx version: 1 No of confirmations: 3219705 RingCT/type: no
Extra: 02210000313f6e048ace65994f9ba7ce26957ddc2798a1342e627c5ae04294ce3407f80122d55c9d212484ad416e70e4a397e4fdc44c18cf2b6bc3931d905c70a48a87eb

4 output(s) for total of 0.260100000000 xmr

stealth address amount amount idx tag
00: c29257d58d820515bf4a41b887d6163f3b3e5cfa2dac81901b32e0fa56f62f55 0.000100000000 28976 of 79261 -
01: f50a7fabaee232d25bed68badcdd06ca2287218d51dcfffe7a17d5d8c8dd0d00 0.010000000000 97295 of 502466 -
02: eb08b7386728cdf3538553a2478f47aaf61649c9818d4c7c75a59231cf87334e 0.050000000000 31554 of 284521 -
03: bf01005d11191bfe56d7b67f8bcbe5780359f2e5b9ba84acb4b18619899ab20d 0.200000000000 22875 of 1272210 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-06 05:28:37 till 2014-06-06 07:44:06; resolution: 0.00 days)

  • |_______________________________________________________________________________________________*__________________________________________________________________________|
  • |_______________________________________________________________________________________________*__________________________________________________________________________|
  • |___________________________________________________________________________*______________________________________________________________________________________________|
  • |_______________________________________________________________________________________________*__________________________________________________________________________|
  • |___________________________________________________________________________*______________________________________________________________________________________________|
  • |___________________________________________________________________________*______________________________________________________________________________________________|
  • |_______________________________________________________________________________________________*__________________________________________________________________________|

7 inputs(s) for total of 0.260102000000 xmr

key image 00: 8e66cda120102395b492f38a1bb74c46635af167aae986d02833ce225969ba44 amount: 0.000009000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: adda55851cb0b0c9e6379664f36772c60b06b5ad3526497f914b1b5b72dc352b 00072949 1 2/8 2014-06-06 06:44:06 10:180:03:53:09
key image 01: faba6ed8ec8ad9c5c4ccf83bb67f4e0ece4bfd651984719171fb2411a6bf4ab8 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b65dcefab54ea95ac68a3c0036701fc915ddaef481a5d049f479b7e82364f183 00072949 1 5/6 2014-06-06 06:44:06 10:180:03:53:09
key image 02: c15076762dcc6cfed02ffd1c50319fda35daf9b106dcb1647fe354938a026cb9 amount: 0.000009000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d363548f3dc7b99a292917e1490bb4ebafc1fec7f7f0d97eca202b231d5270b8 00072935 1 3/8 2014-06-06 06:28:37 10:180:04:08:38
key image 03: 60657f8ab1b97c4c579c5d5f30d291b560ee1b01b1d9ccfcd62304419c53125b amount: 0.000007000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6b25eb7113643302cfeb9e33ddcff1c487ac2c7ad8d9b9d61e9266a9222d9524 00072949 1 5/6 2014-06-06 06:44:06 10:180:03:53:09
key image 04: 5928533afbcb6143b63d404223180d2681b6da2f3d5d617b2dc0418a0010fbc5 amount: 0.000007000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 78a213917e7714f43dda50359f7980b710d0b81f64e57b2ae81dd1a661d82131 00072935 1 6/6 2014-06-06 06:28:37 10:180:04:08:38
key image 05: 492767ac26906e08aa3d7d93f5f1f692e58f780951e4caf701af9f04d33816ef amount: 0.000070000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f335ca61a8e0ad7845151f11c02c661f842ad94bf23aa631303457b76f8a5483 00072935 1 6/6 2014-06-06 06:28:37 10:180:04:08:38
key image 06: 3f7ad74f5a3668102c59415984f52522e5de14189ddf27074641b2f4e27630f4 amount: 0.060000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 666b50c89ae02d9ca63fd8c20a3f77c38a93234270861ac26dd9e7ac403ab7ea 00072949 1 10/8 2014-06-06 06:44:06 10:180:03:53:09
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 9000000, "key_offsets": [ 16436 ], "k_image": "8e66cda120102395b492f38a1bb74c46635af167aae986d02833ce225969ba44" } }, { "key": { "amount": 200000000000, "key_offsets": [ 22840 ], "k_image": "faba6ed8ec8ad9c5c4ccf83bb67f4e0ece4bfd651984719171fb2411a6bf4ab8" } }, { "key": { "amount": 9000000, "key_offsets": [ 16433 ], "k_image": "c15076762dcc6cfed02ffd1c50319fda35daf9b106dcb1647fe354938a026cb9" } }, { "key": { "amount": 7000000, "key_offsets": [ 13172 ], "k_image": "60657f8ab1b97c4c579c5d5f30d291b560ee1b01b1d9ccfcd62304419c53125b" } }, { "key": { "amount": 7000000, "key_offsets": [ 13171 ], "k_image": "5928533afbcb6143b63d404223180d2681b6da2f3d5d617b2dc0418a0010fbc5" } }, { "key": { "amount": 70000000, "key_offsets": [ 28742 ], "k_image": "492767ac26906e08aa3d7d93f5f1f692e58f780951e4caf701af9f04d33816ef" } }, { "key": { "amount": 60000000000, "key_offsets": [ 27779 ], "k_image": "3f7ad74f5a3668102c59415984f52522e5de14189ddf27074641b2f4e27630f4" } } ], "vout": [ { "amount": 100000000, "target": { "key": "c29257d58d820515bf4a41b887d6163f3b3e5cfa2dac81901b32e0fa56f62f55" } }, { "amount": 10000000000, "target": { "key": "f50a7fabaee232d25bed68badcdd06ca2287218d51dcfffe7a17d5d8c8dd0d00" } }, { "amount": 50000000000, "target": { "key": "eb08b7386728cdf3538553a2478f47aaf61649c9818d4c7c75a59231cf87334e" } }, { "amount": 200000000000, "target": { "key": "bf01005d11191bfe56d7b67f8bcbe5780359f2e5b9ba84acb4b18619899ab20d" } } ], "extra": [ 2, 33, 0, 0, 49, 63, 110, 4, 138, 206, 101, 153, 79, 155, 167, 206, 38, 149, 125, 220, 39, 152, 161, 52, 46, 98, 124, 90, 224, 66, 148, 206, 52, 7, 248, 1, 34, 213, 92, 157, 33, 36, 132, 173, 65, 110, 112, 228, 163, 151, 228, 253, 196, 76, 24, 207, 43, 107, 195, 147, 29, 144, 92, 112, 164, 138, 135, 235 ], "signatures": [ "a9523df353b0ee1a4744da49df5e4e6a92a0f7ccf93a28c82d8ec14f2a2ccb053937f04ef61f8019342e7a229ac806768ab7f2c3b99be2e9923d610fa9065300", "01b428a1321bee029830ad406b2107257930fcfcf7e7dfff84e421795ce4d80b24d57689a6901163e17a033116abae06358ce9d4e1acef986cdd30da9fdc6208", "25969a9fecc6d96e3f9c0216c1fbd8b7cada3cfb1209f6fee122dbedea85de0b3b4d623316652b8fe8943a5893ab5c8ba65e433f9ff02a84015b132e95897001", "e6f18f76a0af2e930cdbb2dbfdc5172bb91a7d4afd4fe401d73e25ebd6b0010c548c833ea37b48ca57e69d71ac31e57cd31b8fe54dddcda1bd9bc7f975b08a0e", "254978bbd0287c5623f3d67a67612ff71dc6c6f8f8eda902b286fce6da1b8e04e9f997ae472d7dbadacc6893fd3f3aa59810141c34b8dff8fd7f045db52be407", "db5f5ea85b3f3c235428b0a42071bf177e0dfdb7eea886b466e09602a66c200cee353a97e51d125a91136fdddf74a52c4e9807578aacb3957d5a1205b15f7602", "b00c86e46e3234c5d325bbdc3dbd471d819b8cd72c282339415ac986d6e3260424f691553f953e0d39d4f7e6e81ffd91e1953b5dad6b65fdc8e18eaba577d20d"] }


Less details
source code | moneroexplorer