Monero Transaction ffd667c029a5e5bd55b1aaf2afbcb5c20cfb31269687941026b9068560f31141

Autorefresh is OFF

Tx hash: ffd667c029a5e5bd55b1aaf2afbcb5c20cfb31269687941026b9068560f31141

Tx prefix hash: 72fe00de799c96267834fced715cf484afa1fb119a4c631f6f8ea6d205c10265
Tx public key: 80298a28fb7ff772f5165c6c2a3336bc9c076b4adfd1cbc57964f352d7415b44
Payment id: 8365372e855498964a533e72d11418d68f9d7bb0cc07ef380f34a65635e64ca6

Transaction ffd667c029a5e5bd55b1aaf2afbcb5c20cfb31269687941026b9068560f31141 was carried out on the Monero network on 2014-10-30 21:01:20. The transaction has 3009043 confirmations. Total output fee is 0.133809016176 XMR.

Timestamp: 1414702880 Timestamp [UTC]: 2014-10-30 21:01:20 Age [y:d:h:m:s]: 10:033:15:40:55
Block: 283705 Fee (per_kB): 0.133809016176 (0.162539065912) Tx size: 0.8232 kB
Tx version: 1 No of confirmations: 3009043 RingCT/type: no
Extra: 0221008365372e855498964a533e72d11418d68f9d7bb0cc07ef380f34a65635e64ca60180298a28fb7ff772f5165c6c2a3336bc9c076b4adfd1cbc57964f352d7415b44

6 output(s) for total of 20.529466320000 xmr

stealth address amount amount idx tag
00: 4ebaa740b694d8f959c65e8ce622eafe89e7cdac08a2681f2ff85195fb621284 0.029466320000 0 of 1 -
01: adbf1a34cf32e08ab51be76b6e6e409ebfbd62e64ec64222b7ec90282fa96bcb 0.100000000000 615370 of 982315 -
02: b5dde1cd88bbcd3cc71817702bfc2ad309497e866964eca2157ac16b212efdcd 0.400000000000 258527 of 688584 -
03: 0492a027564891d24ddd85da0e415bc4f99e422430329cba814b5cd85e5da455 1.000000000000 321189 of 874629 -
04: 10c102bbb0c479bddce3724ce6d4267c8988db45daeb3349c71aacb65c416a83 9.000000000000 24800 of 274259 -
05: e347e103f67807c9871c89963c071e44a30fc11430c8aeaff1e296449eb741ad 10.000000000000 330152 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-09-12 19:29:31 till 2014-10-30 18:32:03; resolution: 0.28 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |______________________________________________________________________________________________________________________________________________________________________*___|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |________________________________________________________________________________________________________________________________________________________________________*_|
  • |_________________________________________________________________________________________________________________________________________________________________________*|

5 inputs(s) for total of 20.663275336176 xmr

key image 00: a72df519fe692bf31a688d3e520e456512c69521f9f5e4ac07fc00cfa57db9d0 amount: 0.063275336176
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5e4480361e56c653ceda301d7d421e299432619a2882185ccc6a1e88d3b7fa90 00215106 0 0/4 2014-09-12 20:29:31 10:081:16:12:44
key image 01: 6cdc20e17fe2784f145fbbc8f58f8a9c7a2d91dc2057d41852b666e028ae0e17 amount: 0.600000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a55de6d0b0ca7782dbfcf0826c91add893db418d3702f50d2f5623b63c09456d 00282055 0 0/4 2014-10-29 17:33:19 10:034:19:08:56
key image 02: d3db5319794b8cfe97f4014d5271b5c0729fe2c1d88f46438c502f38e8e96cc9 amount: 7.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: fdb2dc1608c6859004568d2559eb57c3810dd1629225a903485892d5519d90b6 00283409 1 10/111 2014-10-30 15:48:38 10:033:20:53:37
key image 03: 124b9f11a17b51caa3956c3f3ca62992727d93d82535b116cd3c3a7f4b381967 amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b79ecd7070409fed4fbff0472c58e6fbb1692be82fc947951bf60a97b35df08b 00282953 0 0/4 2014-10-30 08:46:55 10:034:03:55:20
key image 04: c18790807f1e673ce5e2681a3b2886869ec547a42b578e6e17c6855a5d9bbd7f amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b5a17bd0f50b4ad43787b3e7866ea01fc2513efd8835ba0206c9d8da3cd3f5d4 00283500 0 0/4 2014-10-30 17:32:03 10:033:19:10:12
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 63275336176, "key_offsets": [ 0 ], "k_image": "a72df519fe692bf31a688d3e520e456512c69521f9f5e4ac07fc00cfa57db9d0" } }, { "key": { "amount": 600000000000, "key_offsets": [ 258950 ], "k_image": "6cdc20e17fe2784f145fbbc8f58f8a9c7a2d91dc2057d41852b666e028ae0e17" } }, { "key": { "amount": 7000000000000, "key_offsets": [ 59256 ], "k_image": "d3db5319794b8cfe97f4014d5271b5c0729fe2c1d88f46438c502f38e8e96cc9" } }, { "key": { "amount": 3000000000000, "key_offsets": [ 111044 ], "k_image": "124b9f11a17b51caa3956c3f3ca62992727d93d82535b116cd3c3a7f4b381967" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 329906 ], "k_image": "c18790807f1e673ce5e2681a3b2886869ec547a42b578e6e17c6855a5d9bbd7f" } } ], "vout": [ { "amount": 29466320000, "target": { "key": "4ebaa740b694d8f959c65e8ce622eafe89e7cdac08a2681f2ff85195fb621284" } }, { "amount": 100000000000, "target": { "key": "adbf1a34cf32e08ab51be76b6e6e409ebfbd62e64ec64222b7ec90282fa96bcb" } }, { "amount": 400000000000, "target": { "key": "b5dde1cd88bbcd3cc71817702bfc2ad309497e866964eca2157ac16b212efdcd" } }, { "amount": 1000000000000, "target": { "key": "0492a027564891d24ddd85da0e415bc4f99e422430329cba814b5cd85e5da455" } }, { "amount": 9000000000000, "target": { "key": "10c102bbb0c479bddce3724ce6d4267c8988db45daeb3349c71aacb65c416a83" } }, { "amount": 10000000000000, "target": { "key": "e347e103f67807c9871c89963c071e44a30fc11430c8aeaff1e296449eb741ad" } } ], "extra": [ 2, 33, 0, 131, 101, 55, 46, 133, 84, 152, 150, 74, 83, 62, 114, 209, 20, 24, 214, 143, 157, 123, 176, 204, 7, 239, 56, 15, 52, 166, 86, 53, 230, 76, 166, 1, 128, 41, 138, 40, 251, 127, 247, 114, 245, 22, 92, 108, 42, 51, 54, 188, 156, 7, 107, 74, 223, 209, 203, 197, 121, 100, 243, 82, 215, 65, 91, 68 ], "signatures": [ "50f48bed6d149221b12263ba234cec7be10911db150e988a12976730653e83048cca1b21cc4f714ee00343c716106db3382e9271bf8018787231dce7c8dd5d03", "fe446b39fff5a2d941b6d5dc1500a429341e950500f4e7c726f2b46f52186a063518f9d5f74a65ffe27113f1ab569d501a53dfebf5100fe948ef330d93ff260a", "1b14806db54a0df04a39cf5a7774b01e27fa9a1924059ee6b154c1d371ec6e012395284c7b06a48fd8b089aac8fe8ff937c040dd673394a21d36e337015ede01", "f5f33526131249e6b51ef66d380f3c86d3ea625b41c1913b3ad2174429fc620c47ef4ba0ae1213967b26b92f511ae57238e649ee79832afcd0397144780bbb0c", "188104bdc59a805a2ef7b62c80e425a6cbba4dc824a7c9c7ba473df5f3cc0305a0d4e236d07d1f57358bc89a6cbb1965add1f8f8d5f307f55263f9e387267709"] }


Less details
source code | moneroexplorer