Monero Transaction fdf48ef4a245e795af8a690e573ef811cd672d767791f4f9f456213fa47be85a

Autorefresh is OFF

Tx hash: fdf48ef4a245e795af8a690e573ef811cd672d767791f4f9f456213fa47be85a

Tx prefix hash: 07eee21fd1b81fac2c4055e2e2bfa4d9272a81e3172111d8f4c2e395e10dc401
Tx public key: c02209a7ed183d14d3f180eeb7f46fb4902bb033b2f42f0845991e7902e8e029
Payment id: 4d0820a231414c1426ad06f992f453e4839aeb2f8fbf09b59901ff71a9ffc35b

Transaction fdf48ef4a245e795af8a690e573ef811cd672d767791f4f9f456213fa47be85a was carried out on the Monero network on 2014-05-26 11:07:14. The transaction has 3221092 confirmations. Total output fee is 0.000001805344 XMR.

Timestamp: 1401102434 Timestamp [UTC]: 2014-05-26 11:07:14 Age [y:d:h:m:s]: 10:171:01:29:46
Block: 57238 Fee (per_kB): 0.000001805344 (0.000002337133) Tx size: 0.7725 kB
Tx version: 1 No of confirmations: 3221092 RingCT/type: no
Extra: 0221004d0820a231414c1426ad06f992f453e4839aeb2f8fbf09b59901ff71a9ffc35b01c02209a7ed183d14d3f180eeb7f46fb4902bb033b2f42f0845991e7902e8e029

5 output(s) for total of 6.060507000000 xmr

stealth address amount amount idx tag
00: 94acd5f8eb5c2369dc96baab0a91bc2326c959e1726a06d1ab40259a1fafcfd0 0.000007000000 10474 of 41473 -
01: bd6b5f1f584d89ace9ddef38ee479cb880af384a1ccffe719b13e16fc0e8feb1 0.000500000000 18981 of 77939 -
02: 8a390f277e1baf050bcd7add07104080be1c9cfd35c1795d5bddaeaa0ba52746 0.060000000000 10040 of 264760 -
03: 46e3f0cf2c4bb51a3562acf738157ca6fa48c706074a8091de50b723050c6b7b 3.000000000000 1422 of 300495 -
04: 8ccfc68449fae67f0b50bf0fa0bb10e494027fb0c467086efa737d94528fdd44 3.000000000000 1423 of 300495 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-26 09:48:49 till 2014-05-26 11:48:49; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|

5 inputs(s) for total of 6.060508805344 xmr

key image 00: a7956afb9b28543bd6823c1ec2c91c49b3b1a2c1e1ffc707abdbce8a5312c1af amount: 0.000000805344
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: dac564514658e9c062b35ce5463347f0b329d94ea45f692afac86bc471fb8f19 00057221 1 9/14 2014-05-26 10:48:49 10:171:01:48:11
key image 01: a720830177a32d38910408bfc4bc4a88ef86929e972d5974d47c04d181cceed5 amount: 0.000500000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9f6181393db44d5c8502a28549157a24bc9623aad86a43d78fde6a663ad55c9c 00057221 1 9/14 2014-05-26 10:48:49 10:171:01:48:11
key image 02: 104248d50681d7e43b9048b92fed94c4d3f03f495dd28d41a32e4a6cc1240bea amount: 0.000008000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 88b873a21d7c34687066c01e7246c434f6f3c4f2623c7041053be9a7bb8a1564 00057221 1 9/14 2014-05-26 10:48:49 10:171:01:48:11
key image 03: 9130d9f0cb7d692e1a13c79544246b8775cd26cdc3ceb3c35b39a59bca5a05c1 amount: 0.060000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5f01a6d73611740c38bec7e39407998854f764897918f5dadd0ec039d9b0a625 00057221 1 9/14 2014-05-26 10:48:49 10:171:01:48:11
key image 04: 705308a7b3f093d4ff973c72353369f1a65d71a3733c4d416f1b790b76d993d5 amount: 6.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: deb7605f2e881cd53ac714c29e013b158dfca2b2d8ea3955e3f212d40af13b6c 00057221 1 9/14 2014-05-26 10:48:49 10:171:01:48:11
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 805344, "key_offsets": [ 0 ], "k_image": "a7956afb9b28543bd6823c1ec2c91c49b3b1a2c1e1ffc707abdbce8a5312c1af" } }, { "key": { "amount": 500000000, "key_offsets": [ 18891 ], "k_image": "a720830177a32d38910408bfc4bc4a88ef86929e972d5974d47c04d181cceed5" } }, { "key": { "amount": 8000000, "key_offsets": [ 10965 ], "k_image": "104248d50681d7e43b9048b92fed94c4d3f03f495dd28d41a32e4a6cc1240bea" } }, { "key": { "amount": 60000000000, "key_offsets": [ 10008 ], "k_image": "9130d9f0cb7d692e1a13c79544246b8775cd26cdc3ceb3c35b39a59bca5a05c1" } }, { "key": { "amount": 6000000000000, "key_offsets": [ 20659 ], "k_image": "705308a7b3f093d4ff973c72353369f1a65d71a3733c4d416f1b790b76d993d5" } } ], "vout": [ { "amount": 7000000, "target": { "key": "94acd5f8eb5c2369dc96baab0a91bc2326c959e1726a06d1ab40259a1fafcfd0" } }, { "amount": 500000000, "target": { "key": "bd6b5f1f584d89ace9ddef38ee479cb880af384a1ccffe719b13e16fc0e8feb1" } }, { "amount": 60000000000, "target": { "key": "8a390f277e1baf050bcd7add07104080be1c9cfd35c1795d5bddaeaa0ba52746" } }, { "amount": 3000000000000, "target": { "key": "46e3f0cf2c4bb51a3562acf738157ca6fa48c706074a8091de50b723050c6b7b" } }, { "amount": 3000000000000, "target": { "key": "8ccfc68449fae67f0b50bf0fa0bb10e494027fb0c467086efa737d94528fdd44" } } ], "extra": [ 2, 33, 0, 77, 8, 32, 162, 49, 65, 76, 20, 38, 173, 6, 249, 146, 244, 83, 228, 131, 154, 235, 47, 143, 191, 9, 181, 153, 1, 255, 113, 169, 255, 195, 91, 1, 192, 34, 9, 167, 237, 24, 61, 20, 211, 241, 128, 238, 183, 244, 111, 180, 144, 43, 176, 51, 178, 244, 47, 8, 69, 153, 30, 121, 2, 232, 224, 41 ], "signatures": [ "a8ca1fef485ce64cecbeb9e8b29598f109d0912c1181db50c250143347d416074bb6f69223035cecd6c0d2725f4112e0ddfebcd98d2b098c5cbab057e73ac008", "f4870bcfb595c329347f423275df0e6ac76d20922c20f4326826c148d68dc30df5e91adf48cbc43999b3c401a1ee81e4be43aa2402b0096a35c5566185b33709", "3570b70dd73f2ebea071bb239c9411d643e4574032155a127f2afa1e95aa3e0a74e17c14259f631e4aed97f962e7db621cff097efae833a5d9e8aed1010b2a0e", "96af7e29926a81bb9b71bd8335cbe149ba718f734b3396fcb7ba4f43c28a7700271d8db08f2ec5a925106882bede51279c5e05d686d7ea8ef68ff47845a4d70d", "aa95cea9f2a53535a7d284a484844e4ee8c2295926e2c32834d5527543d0ab08f208c9816b008906f8298cbe495c38447717a78c421e8919d84eba0c530e050b"] }


Less details
source code | moneroexplorer