Monero Transaction ff80ca1ad241b6b474e56ad7e3558c274370a219c856802a0342f6c80cf27ccc

Autorefresh is OFF

Tx hash: ff80ca1ad241b6b474e56ad7e3558c274370a219c856802a0342f6c80cf27ccc

Tx prefix hash: 6d048e939ee18888d4e5410588762a6147b1cf10870cdbd62d14bc630ec9f74e
Tx public key: 99a0d7f5412335ec2d890747abe4bccbad798a191a55070a686f84d241fe9a99
Payment id: 45f8a55d09f04ac1a63244a47a9a5b5462c8de77a6a0499f9b167a802bd2b22b

Transaction ff80ca1ad241b6b474e56ad7e3558c274370a219c856802a0342f6c80cf27ccc was carried out on the Monero network on 2014-06-18 08:19:57. The transaction has 3187866 confirmations. Total output fee is 0.005425950000 XMR.

Timestamp: 1403079597 Timestamp [UTC]: 2014-06-18 08:19:57 Age [y:d:h:m:s]: 10:148:06:28:32
Block: 90530 Fee (per_kB): 0.005425950000 (0.006139417459) Tx size: 0.8838 kB
Tx version: 1 No of confirmations: 3187866 RingCT/type: no
Extra: 02210045f8a55d09f04ac1a63244a47a9a5b5462c8de77a6a0499f9b167a802bd2b22b0199a0d7f5412335ec2d890747abe4bccbad798a191a55070a686f84d241fe9a99

5 output(s) for total of 34.662000000000 xmr

stealth address amount amount idx tag
00: bcbb2498857b785395ad04c5e9db72cfa68b3476c31ba8a5c93aefd09e2b43d1 0.002000000000 39319 of 95915 -
01: 542fed9da72d9a55e1028f2d9b0f758251613066ce73c5d8dae4563700fd1ef7 0.060000000000 71825 of 264760 -
02: 87c1271146cba41b6972058897fd2ed6f028fea1ece0f67653a9bc37b8d2976f 0.600000000000 23462 of 650760 -
03: 97d148305b665b1a806161f17b075a80d8f444db44d1721a3af3e38b96508ea4 4.000000000000 10551 of 237197 -
04: 39c2eea21d32378bca504c4b1e9069b4ac9a376119258d807cb1ee61f41644c4 30.000000000000 1272 of 49201 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-17 17:54:01 till 2014-06-18 08:51:19; resolution: 0.00 days)

  • |______________________________________________________________________________________________________________________________________________________________*___________|
  • |______________________________________________________________________________________________________________________________________________________________*___________|
  • |______________________________________________________________________________________________________________________________________________________________*___________|
  • |____________*_____________________________________________________________________________________________________________________________________________________________|
  • |______________________________________________________________________________________________________________________________________________________________*___________|
  • |______________________________________________________________________________________________________________________________________________________________*___________|

6 inputs(s) for total of 34.667425950000 xmr

key image 00: ed2766bb23bf3c0b6e360698216ca7e0f443ef0ce74368511830543b5a07a694 amount: 30.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6911a90e13f975267f1416dc2e7d776a1d605f07a068790732e72b6a1337e6ce 00090515 1 6/8 2014-06-18 07:51:19 10:148:06:57:10
key image 01: 0b1af69e8895fbeb44de72380bc1e8ac5cc2586c6668ba431a45c431c7c668e5 amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e490dd2a495c03b4ba894c0a5038cffa0f9ee281badca42fa11a039d034d9620 00090515 1 6/8 2014-06-18 07:51:19 10:148:06:57:10
key image 02: 6b9ce7a59c397fca92a5de2f7dbbb734fd62258f08fb6b6a2606e63a21237d1c amount: 0.600000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3b0a5dd0aa055d7cc744157a1a79cf8d58a82ce9ca641492045f1f56d5ae3d20 00090515 1 6/8 2014-06-18 07:51:19 10:148:06:57:10
key image 03: 421c675aad949346cdcc5f71aa632c5c1cbfb6bcf6feffd9784dbc3f79206455 amount: 0.008000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 01fc0bf96a2c06369eea7131a1bc1e3d64d8d9139aa3717fe6a8acb89c73a7db 00089609 1 5/5 2014-06-17 18:54:01 10:148:19:54:28
key image 04: 9927e3f451e5421aae465e59e66fb44fe4e5312a9ecabd4fe0b6523d78dca133 amount: 0.009425950000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7e39951291e9f460a3201461dd0bf5c6bbf56354674b3c7e6854b34afcf479c7 00090515 1 6/8 2014-06-18 07:51:19 10:148:06:57:10
key image 05: 7f9e637814f77c9fe129f4d4b3880ea23e03f55861ceb530676287dffd9d16eb amount: 0.050000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: fff248830b1511ced2cc6c1588722c5b1e7dd3becf0768dc28d920b835342ea6 00090515 1 6/8 2014-06-18 07:51:19 10:148:06:57:10
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 30000000000000, "key_offsets": [ 1271 ], "k_image": "ed2766bb23bf3c0b6e360698216ca7e0f443ef0ce74368511830543b5a07a694" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 10545 ], "k_image": "0b1af69e8895fbeb44de72380bc1e8ac5cc2586c6668ba431a45c431c7c668e5" } }, { "key": { "amount": 600000000000, "key_offsets": [ 23454 ], "k_image": "6b9ce7a59c397fca92a5de2f7dbbb734fd62258f08fb6b6a2606e63a21237d1c" } }, { "key": { "amount": 8000000000, "key_offsets": [ 126550 ], "k_image": "421c675aad949346cdcc5f71aa632c5c1cbfb6bcf6feffd9784dbc3f79206455" } }, { "key": { "amount": 9425950000, "key_offsets": [ 0 ], "k_image": "9927e3f451e5421aae465e59e66fb44fe4e5312a9ecabd4fe0b6523d78dca133" } }, { "key": { "amount": 50000000000, "key_offsets": [ 82744 ], "k_image": "7f9e637814f77c9fe129f4d4b3880ea23e03f55861ceb530676287dffd9d16eb" } } ], "vout": [ { "amount": 2000000000, "target": { "key": "bcbb2498857b785395ad04c5e9db72cfa68b3476c31ba8a5c93aefd09e2b43d1" } }, { "amount": 60000000000, "target": { "key": "542fed9da72d9a55e1028f2d9b0f758251613066ce73c5d8dae4563700fd1ef7" } }, { "amount": 600000000000, "target": { "key": "87c1271146cba41b6972058897fd2ed6f028fea1ece0f67653a9bc37b8d2976f" } }, { "amount": 4000000000000, "target": { "key": "97d148305b665b1a806161f17b075a80d8f444db44d1721a3af3e38b96508ea4" } }, { "amount": 30000000000000, "target": { "key": "39c2eea21d32378bca504c4b1e9069b4ac9a376119258d807cb1ee61f41644c4" } } ], "extra": [ 2, 33, 0, 69, 248, 165, 93, 9, 240, 74, 193, 166, 50, 68, 164, 122, 154, 91, 84, 98, 200, 222, 119, 166, 160, 73, 159, 155, 22, 122, 128, 43, 210, 178, 43, 1, 153, 160, 215, 245, 65, 35, 53, 236, 45, 137, 7, 71, 171, 228, 188, 203, 173, 121, 138, 25, 26, 85, 7, 10, 104, 111, 132, 210, 65, 254, 154, 153 ], "signatures": [ "0fc46744ff5f7f100a25f560dda55233e814564209bf4d256633c40da731ae0d7fcc79fcf9611f6404fe642b2dc5293065bd34542100362cd6aada4c7435140e", "37990a7668a28242abbb6e9ec7d3388a5d790f32bcb954974684096e1398360a4f08327b486e0a0eb26615b56b6467f4c86c017b1d63787af6a164f953fa160c", "3060dde973168d427a7888054ea78b519bf842595b001261316d10362f30ae0cfe3dea46b2a56e07575292cd609a0fa54f49a2a7a316d3fab698a23f0d47b30f", "8a3e8b17a4a73cd52e472eb2f8124be6cd68544f6b68e0492e5af2c4f60bd50c6e03da0bf30f990a325b9d7783a45c0821ca2829369e02134f3d98fc5188440e", "83c1ec579aeabff52cc4c7cf7f0d27371cbdc3e91528587496a69cd50aacf6049871bef09323e5e5dfc29b61d26b33c2fd455fd533955111c71d1f18bbd4000b", "5a4c1a74728741a514b292292a6155d3cff48993a3b61282145dde0f7ed2120512d9751bdd5964f2b76a1c09bde9f6d42fef2e729575745c6f123a811549b009"] }


Less details
source code | moneroexplorer