Monero Transaction ff2b7df251aaf63f165274b1d415435ab2f0cacdc59828f2756c9cf6b52a327f

Autorefresh is OFF

Tx hash: ff2b7df251aaf63f165274b1d415435ab2f0cacdc59828f2756c9cf6b52a327f

Tx prefix hash: e987673e5bd656872ce9fdd3622acc8bc2fdb56f1c0561359def69fc18bcd32d
Tx public key: ea5a1f0e8548f4935202207557c94a82f8589341398ca718b1a99f4311875790
Payment id: bd1e529a09764db1932c1b249eab1f7f769c56cd81fa4351a7a7f4a3f27e99bb

Transaction ff2b7df251aaf63f165274b1d415435ab2f0cacdc59828f2756c9cf6b52a327f was carried out on the Monero network on 2014-08-25 02:37:50. The transaction has 3125687 confirmations. Total output fee is 0.199333300000 XMR.

Timestamp: 1408934270 Timestamp [UTC]: 2014-08-25 02:37:50 Age [y:d:h:m:s]: 10:129:20:32:11
Block: 188212 Fee (per_kB): 0.199333300000 (0.353756151127) Tx size: 0.5635 kB
Tx version: 1 No of confirmations: 3125687 RingCT/type: no
Extra: 022100bd1e529a09764db1932c1b249eab1f7f769c56cd81fa4351a7a7f4a3f27e99bb01ea5a1f0e8548f4935202207557c94a82f8589341398ca718b1a99f4311875790

4 output(s) for total of 10.500666700000 xmr

stealth address amount amount idx tag
00: cb803a9d1d22b87f48c9034ff63750173c3852e96b64a34c84d39e2b72fac673 0.000666700000 0 of 1 -
01: 8c3fd62153e2ae8de2824425b90cfc6cbafcfddbaf85a4ba31ddca8b2b85720f 0.200000000000 407150 of 1272211 -
02: 7a31050ce4e9f98db44759ccb4d2207f947730e8a9e81a9ad905c8a10cc8698b 0.300000000000 181514 of 976536 -
03: e0f3d71042b9dd4a7e1f390cc271b9e9a7796754926a7bf7869d7c5ef09a1299 10.000000000000 217287 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-04 04:05:59 till 2014-08-25 01:31:19; resolution: 0.48 days)

  • |____________*____________________________________________________________________________________________________________________________________________________________*|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 10.700000000000 xmr

key image 00: cb7f99edc61bd3e1b00000ad8b3b994838d3c687ed6d2d21f72526564bbd830e amount: 0.700000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c29b43c9445cd971ac0c32eae0d5ddb1281bffa0c3ed9391cdf3d817697b58bb 00077881 1 2/71 2014-06-09 17:37:00 10:206:05:33:01
- 01: 15c38a4f66e4dabadd53246aa361609707179292b9d74f2d272f0742517570cc 00188089 0 0/4 2014-08-25 00:31:19 10:129:22:38:42
key image 01: 00bb28f72fdd15ab65a953eb992270ae208784e0c1234c769b919615c8d71ac6 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 99c66f9ed0d9d54feb953e2e479f339fd1ede1f6d5295507772669d54c81bea5 00069947 1 16/55 2014-06-04 05:05:59 10:211:18:04:02
- 01: 38defb634a6b0b09d91ce6db2e8d1330f3ffb95708a4b63e50d0ab8e5e56a19b 00187975 0 0/4 2014-08-24 22:09:03 10:130:01:00:58
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 700000000000, "key_offsets": [ 14168, 108627 ], "k_image": "cb7f99edc61bd3e1b00000ad8b3b994838d3c687ed6d2d21f72526564bbd830e" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 71047, 145957 ], "k_image": "00bb28f72fdd15ab65a953eb992270ae208784e0c1234c769b919615c8d71ac6" } } ], "vout": [ { "amount": 666700000, "target": { "key": "cb803a9d1d22b87f48c9034ff63750173c3852e96b64a34c84d39e2b72fac673" } }, { "amount": 200000000000, "target": { "key": "8c3fd62153e2ae8de2824425b90cfc6cbafcfddbaf85a4ba31ddca8b2b85720f" } }, { "amount": 300000000000, "target": { "key": "7a31050ce4e9f98db44759ccb4d2207f947730e8a9e81a9ad905c8a10cc8698b" } }, { "amount": 10000000000000, "target": { "key": "e0f3d71042b9dd4a7e1f390cc271b9e9a7796754926a7bf7869d7c5ef09a1299" } } ], "extra": [ 2, 33, 0, 189, 30, 82, 154, 9, 118, 77, 177, 147, 44, 27, 36, 158, 171, 31, 127, 118, 156, 86, 205, 129, 250, 67, 81, 167, 167, 244, 163, 242, 126, 153, 187, 1, 234, 90, 31, 14, 133, 72, 244, 147, 82, 2, 32, 117, 87, 201, 74, 130, 248, 88, 147, 65, 57, 140, 167, 24, 177, 169, 159, 67, 17, 135, 87, 144 ], "signatures": [ "35307ec0bdbb7975e81265fdf93969c5cec63599be2a1147daa319a42417c9066a524c8f6f26df54c7c24208fb434a2773b93a7207bfa431765f449ecd3f6500f9a5f4c9e51fa7fc9a4117d30bb18c621a4d88a579c0e2d91ccf5a2d25f2470027f33dc7857ebf12aac11a0fbf6797c2d467429c68742522e71821fe260ace04", "a31164ca4667f12e2a0a4a30b1b67b36cd4f02f8390d7d0fde5deefff1c906038d8cb4a0653d2b2972f7390ef8f4a363a9b97d1d0f39b64703dd5a3f293b450b50288d6db9b58cbcb21840bf331354d21499922b402766c74a7f86eeceaa9e0436165c145864d5d0a8031f74e967341bc5a7c4a2080797e4d0411c9519331407"] }


Less details
source code | moneroexplorer