Monero Transaction fd914b428d94c0ece7574dccd7caaff0a6356fbd8774af32909c2296fd2e42e6

Autorefresh is OFF

Tx hash: fd914b428d94c0ece7574dccd7caaff0a6356fbd8774af32909c2296fd2e42e6

Tx prefix hash: 8f19f595f548348bd9554a47d5603221350eb0b7bb7c2de0a2dfcad3d0635e22
Tx public key: 14f404c4f1fb5ad428243de14073a30889d24821768f1cf7ba2b50806783efda
Payment id: 92ef65b005994a2893fb7cca9a3b043879b89041141d43e1af80e0e4eb39a57b

Transaction fd914b428d94c0ece7574dccd7caaff0a6356fbd8774af32909c2296fd2e42e6 was carried out on the Monero network on 2014-07-30 04:33:52. The transaction has 3127441 confirmations. Total output fee is 0.006894050001 XMR.

Timestamp: 1406694832 Timestamp [UTC]: 2014-07-30 04:33:52 Age [y:d:h:m:s]: 10:106:09:49:23
Block: 150944 Fee (per_kB): 0.006894050001 (0.011516324961) Tx size: 0.5986 kB
Tx version: 1 No of confirmations: 3127441 RingCT/type: no
Extra: 02210092ef65b005994a2893fb7cca9a3b043879b89041141d43e1af80e0e4eb39a57b0114f404c4f1fb5ad428243de14073a30889d24821768f1cf7ba2b50806783efda

5 output(s) for total of 1.493105949999 xmr

stealth address amount amount idx tag
00: 1869a447b4d0f319a35a30bf345edfe2258c1b45ab9653c03d7a635ca4221140 0.003105949999 0 of 1 -
01: ea73713682ec191eeee863befda5c55566f77d24c6a17effb65f0935ddaec76e 0.020000000000 205901 of 381491 -
02: 156949c59949947ecddbb52538ed65b9ff0474aafaf0197c4c40cf633b4fda00 0.070000000000 89194 of 263947 -
03: 4668028b70b790b4b91d1f07e983953fa768976a609e14189840f9cc71fc44a8 0.400000000000 122479 of 688584 -
04: 5beeb5172495d993ada0dcbdbdeac47afa67217c5823064e04f824f5fda04bc8 1.000000000000 148861 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-05 05:23:41 till 2014-07-30 05:13:41; resolution: 0.32 days)

  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |_________________________________________________________________________________*_______________________________________________________________________________________*|

2 inputs(s) for total of 1.500000000000 xmr

key image 00: 3b9fa6fe9643bcb0b71eb2110583d5ccbfdc6085fc0486eabc086191bf7fb689 amount: 0.700000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 65ef4b718359144ed62a647ffface5edd907ac657c478ee93935cf7ddeda12cd 00071536 1 7/99 2014-06-05 06:23:41 10:161:07:59:34
- 01: 1d8a2d60b4e4f23e092b1101d511ba610f1aa2e64f0e2afe8ed91fc9415de604 00150852 2 4/9 2014-07-30 02:56:41 10:106:11:26:34
key image 01: 4e43269c463e1ae1e1404b4312bfae29ebc299a89b25efa714330ed970041849 amount: 0.800000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d89e10cb05b5e36ceba0003e663f6df96e1c238f081c3f7ab76e10bcb2f0fd98 00109423 0 0/6 2014-07-01 09:04:15 10:135:05:19:00
- 01: cdeb26a60ec2346e711306cebc018a6cc012ee84d23cffdc56c4e61061f972b6 00150926 2 2/6 2014-07-30 04:13:41 10:106:10:09:34
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 700000000000, "key_offsets": [ 11225, 76286 ], "k_image": "3b9fa6fe9643bcb0b71eb2110583d5ccbfdc6085fc0486eabc086191bf7fb689" } }, { "key": { "amount": 800000000000, "key_offsets": [ 37723, 52580 ], "k_image": "4e43269c463e1ae1e1404b4312bfae29ebc299a89b25efa714330ed970041849" } } ], "vout": [ { "amount": 3105949999, "target": { "key": "1869a447b4d0f319a35a30bf345edfe2258c1b45ab9653c03d7a635ca4221140" } }, { "amount": 20000000000, "target": { "key": "ea73713682ec191eeee863befda5c55566f77d24c6a17effb65f0935ddaec76e" } }, { "amount": 70000000000, "target": { "key": "156949c59949947ecddbb52538ed65b9ff0474aafaf0197c4c40cf633b4fda00" } }, { "amount": 400000000000, "target": { "key": "4668028b70b790b4b91d1f07e983953fa768976a609e14189840f9cc71fc44a8" } }, { "amount": 1000000000000, "target": { "key": "5beeb5172495d993ada0dcbdbdeac47afa67217c5823064e04f824f5fda04bc8" } } ], "extra": [ 2, 33, 0, 146, 239, 101, 176, 5, 153, 74, 40, 147, 251, 124, 202, 154, 59, 4, 56, 121, 184, 144, 65, 20, 29, 67, 225, 175, 128, 224, 228, 235, 57, 165, 123, 1, 20, 244, 4, 196, 241, 251, 90, 212, 40, 36, 61, 225, 64, 115, 163, 8, 137, 210, 72, 33, 118, 143, 28, 247, 186, 43, 80, 128, 103, 131, 239, 218 ], "signatures": [ "380fab6aac866e17db62d8caf59a66fd8e53eb7d21ced7deb662e8c65fe7f90fa5cbd2f1b269e7fe162ab8022f8a734fb6d9fddcc4c461184224cc70db842805d04c478978a54a4c21a7c0d87159cc15ad29ea36df6cc0360b1f26a4b79f0502b46aeff644df73e3a9aabfa972b1aa8d90ff5186e93518e716793c05ac7fd50a", "ae074d2f1e18ad04fb9bc29cf824674c89d537457ee5ce026643030163d0de08a4d4ac60ddf97797f758d1c9cb69806bae7b5ecb8a410f7b1b9edb3a56c91601719cd36455928c57fc31fa349949a646c6ed4efd7dbb772febc0432b7d7ab407caff7f7cc5baeea2c475fde4aba1d0f58388a040092cf201ed0ce77109fc4e0d"] }


Less details
source code | moneroexplorer