Monero Transaction ff7945dfcf94ebd8bd5eb9e1f28884252e23e6fd825f1d4a705cad10705267dc

Autorefresh is OFF

Tx hash: ff7945dfcf94ebd8bd5eb9e1f28884252e23e6fd825f1d4a705cad10705267dc

Tx prefix hash: 82204803e64a5ea1c4b548a462d2d878d26a8fb178e0b18e1cb7c17647cbf0b1
Tx public key: 4b1c87d76e954d85895fbb2a425fffec9fbd5f55c750e99e1d318266daadda36

Transaction ff7945dfcf94ebd8bd5eb9e1f28884252e23e6fd825f1d4a705cad10705267dc was carried out on the Monero network on 2014-08-26 21:21:36. The transaction has 3118979 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1409088096 Timestamp [UTC]: 2014-08-26 21:21:36 Age [y:d:h:m:s]: 10:122:07:55:00
Block: 190783 Fee (per_kB): 0.100000000000 (0.222125813449) Tx size: 0.4502 kB
Tx version: 1 No of confirmations: 3118979 RingCT/type: no
Extra: 014b1c87d76e954d85895fbb2a425fffec9fbd5f55c750e99e1d318266daadda36

3 output(s) for total of 8.900000000000 xmr

stealth address amount amount idx tag
00: a65bfa48299d9a8d35fe638561811d0cf1de0904c57384fbfe1bcfa594123d12 0.900000000000 104839 of 454894 -
01: 543c39192a2bce38ca807150d75c989bfc05788f81829e0ed90b33f16b4c7ae8 3.000000000000 51699 of 300495 -
02: f3c33d148ad247370444699a36f9f21cc2082dfd9e1a4a0e4f75c1c0186ec8a8 5.000000000000 108609 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-07 09:31:26 till 2014-08-19 21:48:41; resolution: 0.43 days)

  • |_*______________*____________________________________________________________*___________________________________________________________________________________________*|

1 inputs(s) for total of 9.000000000000 xmr

key image 00: 066f12083b1dfc04c2ecfb4b52ebafbe5adad0e0f978307ed47642108db84d9a amount: 9.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0408d306ec61854ea46f4e3cde23792057dad7142a832c22f3aeb196273bc3bf 00074567 1 4/62 2014-06-07 10:31:26 10:202:18:45:10
- 01: 219230e91c268d3b8a4bb36902940f4905c1ebb708573283fab0835172227c3b 00084580 1 1/27 2014-06-14 07:04:46 10:195:22:11:50
- 02: e4913e6610cd53852d7cfac9f69bd34c278ce674f20fff4b051d1bd30d862a51 00122778 1 9/30 2014-07-10 16:16:59 10:169:12:59:37
- 03: f2b8bec32917bcb3e8363deb5ea415cdefc62d1fe7c767d85962c737ebc769be 00180612 5 2/5 2014-08-19 20:48:41 10:129:08:27:55
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 9000000000000, "key_offsets": [ 3202, 1744, 5108, 6632 ], "k_image": "066f12083b1dfc04c2ecfb4b52ebafbe5adad0e0f978307ed47642108db84d9a" } } ], "vout": [ { "amount": 900000000000, "target": { "key": "a65bfa48299d9a8d35fe638561811d0cf1de0904c57384fbfe1bcfa594123d12" } }, { "amount": 3000000000000, "target": { "key": "543c39192a2bce38ca807150d75c989bfc05788f81829e0ed90b33f16b4c7ae8" } }, { "amount": 5000000000000, "target": { "key": "f3c33d148ad247370444699a36f9f21cc2082dfd9e1a4a0e4f75c1c0186ec8a8" } } ], "extra": [ 1, 75, 28, 135, 215, 110, 149, 77, 133, 137, 95, 187, 42, 66, 95, 255, 236, 159, 189, 95, 85, 199, 80, 233, 158, 29, 49, 130, 102, 218, 173, 218, 54 ], "signatures": [ "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"] }


Less details
source code | moneroexplorer