Monero Transaction ff19dcd7a78b45cc2f2ad3c236c3e4ad075ba7af08a0678313feb0927827841b

Autorefresh is OFF

Tx hash: ff19dcd7a78b45cc2f2ad3c236c3e4ad075ba7af08a0678313feb0927827841b

Tx prefix hash: 849d63e6d4575da47cbe503d69e89c6e5c052033dd2a59dc773a9dc3ac9d9674
Tx public key: 926d139c5bf09cd2b5a54f3c10b607d93e5385bc16421ed118330218bfc48fc1
Payment id: d0032618e79f4075a75f85c7183dcb60cf3f7caa4ac54370984887217204823b

Transaction ff19dcd7a78b45cc2f2ad3c236c3e4ad075ba7af08a0678313feb0927827841b was carried out on the Monero network on 2014-07-01 12:41:19. The transaction has 3190936 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1404218479 Timestamp [UTC]: 2014-07-01 12:41:19 Age [y:d:h:m:s]: 10:166:00:23:29
Block: 109663 Fee (per_kB): 0.010000000000 (0.028209366391) Tx size: 0.3545 kB
Tx version: 1 No of confirmations: 3190936 RingCT/type: no
Extra: 022100d0032618e79f4075a75f85c7183dcb60cf3f7caa4ac54370984887217204823b01926d139c5bf09cd2b5a54f3c10b607d93e5385bc16421ed118330218bfc48fc1

2 output(s) for total of 0.220000000000 xmr

stealth address amount amount idx tag
00: 2f6ef43aa23121e992ee6efd8082c25a5c8a94bb095ec85ce015271f917c3a01 0.020000000000 195266 of 381492 -
01: 320ddb57fa2f4d0b948a6bef6e532b9f405daff200fedd163acc8e049999f897 0.200000000000 123191 of 1272210 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-01 06:05:40 till 2014-07-01 10:41:43; resolution: 0.00 days)

  • |_____________________________________*____________________________________________________________________________________________________________________________________|
  • |_____________________________________________________________________________________________________________________________________*____________________________________|

2 inputs(s) for total of 0.230000000000 xmr

key image 00: 5066d71b46fc5f7ba3f789c2c8a613d4e2052d4a1ffe2c50f88843fa354bae08 amount: 0.030000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f9fd211ac771d2b9b5416f55e87f7fd6cf1971e99c8f318acb07efd738438fed 00109294 1 4/2 2014-07-01 07:05:40 10:166:05:59:08
key image 01: abaf68378918775f7b78fdac5edea617f4944fe236d6bc7465ee2a585cadf7c3 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f46696eefc1d50284874a76565b65b5ff5661dbe8f3c99f9ee58ab38ba48d8d3 00109464 1 12/59 2014-07-01 09:41:43 10:166:03:23:05
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 30000000000, "key_offsets": [ 144265 ], "k_image": "5066d71b46fc5f7ba3f789c2c8a613d4e2052d4a1ffe2c50f88843fa354bae08" } }, { "key": { "amount": 200000000000, "key_offsets": [ 122286 ], "k_image": "abaf68378918775f7b78fdac5edea617f4944fe236d6bc7465ee2a585cadf7c3" } } ], "vout": [ { "amount": 20000000000, "target": { "key": "2f6ef43aa23121e992ee6efd8082c25a5c8a94bb095ec85ce015271f917c3a01" } }, { "amount": 200000000000, "target": { "key": "320ddb57fa2f4d0b948a6bef6e532b9f405daff200fedd163acc8e049999f897" } } ], "extra": [ 2, 33, 0, 208, 3, 38, 24, 231, 159, 64, 117, 167, 95, 133, 199, 24, 61, 203, 96, 207, 63, 124, 170, 74, 197, 67, 112, 152, 72, 135, 33, 114, 4, 130, 59, 1, 146, 109, 19, 156, 91, 240, 156, 210, 181, 165, 79, 60, 16, 182, 7, 217, 62, 83, 133, 188, 22, 66, 30, 209, 24, 51, 2, 24, 191, 196, 143, 193 ], "signatures": [ "1fd15a89c155268fdfe57436ff541d53b21b771375662586ac9634fed469f30e1bbd968f9597f274a45360b78e2f28f99d71d8414d3695170973439f7abbbf0b", "30bd8e34a6c0d2b7c0da723f82b34d84720f3d66326e286289878dceccbccd0debe7a5b256b227ea942d357981b8cd6a807d9139013c38dd755ae941f62fe305"] }


Less details
source code | moneroexplorer