Monero Transaction 02b09082020f36990d94ec3ae24ea3727cf62b5e0c07430ae3891fa5d24234d7

Autorefresh is OFF

Tx hash: 02b09082020f36990d94ec3ae24ea3727cf62b5e0c07430ae3891fa5d24234d7

Tx prefix hash: def0061ece21246eb927810735b538a15c8b7513ffc25a4e53b4090af153d21c
Tx public key: 871e2843fd3b564f556ae0e34bae0fd41b1bb66481408a982817efef609a5d3a
Payment id: 5c82fce3ba14b8ba15b4ba4474dde1682522c90e56635eab2b4e520e1aeb9088

Transaction 02b09082020f36990d94ec3ae24ea3727cf62b5e0c07430ae3891fa5d24234d7 was carried out on the Monero network on 2014-07-26 23:55:15. The transaction has 3133778 confirmations. Total output fee is 0.005614490000 XMR.

Timestamp: 1406418915 Timestamp [UTC]: 2014-07-26 23:55:15 Age [y:d:h:m:s]: 10:112:02:49:45
Block: 146371 Fee (per_kB): 0.005614490000 (0.007505532324) Tx size: 0.7480 kB
Tx version: 1 No of confirmations: 3133778 RingCT/type: no
Extra: 0221005c82fce3ba14b8ba15b4ba4474dde1682522c90e56635eab2b4e520e1aeb908801871e2843fd3b564f556ae0e34bae0fd41b1bb66481408a982817efef609a5d3a

9 output(s) for total of 5.002385510000 xmr

stealth address amount amount idx tag
00: fbbe396837220785a81e2098ef70559a2dddb4e157154e43dece02d7329add05 0.000385510000 0 of 1 -
01: 2a399cd557e03a7f452e350bb568f27c452006bd2416d55639703e5c9c7e7285 0.005000000000 195814 of 308585 -
02: 90ceba1370c1ffb8b725850b016ee571b026aaded22d5b868b96d17a1f727fb8 0.007000000000 165627 of 247340 -
03: 5eb055aeaa7144005bf7844d3485706a16e0cf9c5aae80c4e51abb130eb1998e 0.010000000000 318463 of 502466 -
04: 67c4a563c78c5c3cc3e7eadff6635c035e037978d54842bf695a11ec87f4587e 0.080000000000 82889 of 269576 -
05: 910e8cd87dce38d4a4984c984a231c9aab05f5e10e49b3a1f0c3afde820e5e23 0.200000000000 264579 of 1272210 -
06: f5e6fb4e5eb6be4caf72f11ab8c1a23abfe18322bfc5cc97e444cf4c200d40ba 0.700000000000 82786 of 514467 -
07: 6d306ae7b51bf6d5ba6c6b0565de3bb1276f996b3b070e9b37151ae1b6c87b7c 2.000000000000 54871 of 434057 -
08: 9b3ee222a0fd3e8724c53f37d4e703ac1feef106b8a1c6f79b1977e81ce14c0c 2.000000000000 54872 of 434057 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-21 05:12:32 till 2014-07-26 23:37:18; resolution: 0.39 days)

  • |___________*_____________________________________________________________________________________________________________________________________________________________*|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 5.008000000000 xmr

key image 00: 1683c0e4e519d909cb7578adc90570e65bce821758ada6a24a60426b2af56dfd amount: 0.008000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ba1628900d862446d83d934e268f3b17af810d445b0a961fe06c277f33526c3c 00055853 1 8/162 2014-05-25 11:27:37 10:174:15:17:23
- 01: 61d49e9efaea430d2bbd3cc3b51f384f9bb8e8b411b96694b1af1d2466b8f22e 00146273 2 3/7 2014-07-26 22:11:24 10:112:04:33:36
key image 01: 1fe9e9e97d4c0294d1de0077fef54fab8504cf0e25484881a954c667bc8b8481 amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1dbb53e689bbafda70077d5194161d4286f57146fce679bc35ce0249760e2756 00049669 0 0/8 2014-05-21 06:12:32 10:178:20:32:28
- 01: edc147767b97dfdedd024125a3e040c76781ace9cb60d10250785d81fa8f364c 00146301 0 0/6 2014-07-26 22:37:18 10:112:04:07:42
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 8000000000, "key_offsets": [ 12504, 146048 ], "k_image": "1683c0e4e519d909cb7578adc90570e65bce821758ada6a24a60426b2af56dfd" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 739, 72899 ], "k_image": "1fe9e9e97d4c0294d1de0077fef54fab8504cf0e25484881a954c667bc8b8481" } } ], "vout": [ { "amount": 385510000, "target": { "key": "fbbe396837220785a81e2098ef70559a2dddb4e157154e43dece02d7329add05" } }, { "amount": 5000000000, "target": { "key": "2a399cd557e03a7f452e350bb568f27c452006bd2416d55639703e5c9c7e7285" } }, { "amount": 7000000000, "target": { "key": "90ceba1370c1ffb8b725850b016ee571b026aaded22d5b868b96d17a1f727fb8" } }, { "amount": 10000000000, "target": { "key": "5eb055aeaa7144005bf7844d3485706a16e0cf9c5aae80c4e51abb130eb1998e" } }, { "amount": 80000000000, "target": { "key": "67c4a563c78c5c3cc3e7eadff6635c035e037978d54842bf695a11ec87f4587e" } }, { "amount": 200000000000, "target": { "key": "910e8cd87dce38d4a4984c984a231c9aab05f5e10e49b3a1f0c3afde820e5e23" } }, { "amount": 700000000000, "target": { "key": "f5e6fb4e5eb6be4caf72f11ab8c1a23abfe18322bfc5cc97e444cf4c200d40ba" } }, { "amount": 2000000000000, "target": { "key": "6d306ae7b51bf6d5ba6c6b0565de3bb1276f996b3b070e9b37151ae1b6c87b7c" } }, { "amount": 2000000000000, "target": { "key": "9b3ee222a0fd3e8724c53f37d4e703ac1feef106b8a1c6f79b1977e81ce14c0c" } } ], "extra": [ 2, 33, 0, 92, 130, 252, 227, 186, 20, 184, 186, 21, 180, 186, 68, 116, 221, 225, 104, 37, 34, 201, 14, 86, 99, 94, 171, 43, 78, 82, 14, 26, 235, 144, 136, 1, 135, 30, 40, 67, 253, 59, 86, 79, 85, 106, 224, 227, 75, 174, 15, 212, 27, 27, 182, 100, 129, 64, 138, 152, 40, 23, 239, 239, 96, 154, 93, 58 ], "signatures": [ "040b1a683e0fd16ea8f4c19fcdeb9d69ee81b694c3ced922eedaf15e387fb00e8b9d2aed2dac425d0d9853f4602840ff8636177176027fa08eda159b116f4c07766539a30e4a455186bece3879f6d0d1d9477fabc2c604fde3f767be02098f09f306530c58ed36c7a63a4bd74d0e73e743237b5400f2c9d12f25cac8994f4606", "8f31fd3888b713db993775d09e9d04ef0b9eba0693908d0da4dcce688908060c86950a7d995c741b4ffc05149c5575a64a46c0f0643558fae8425cb9af7b69046fbb6f95b66b56ef9a268d1539af4b45a004026e1ff503491d56fac6ea1f52085b91c546e09fd1cfa07141e19373b3350c2e4845c7776c20722327d4b6475506"] }


Less details
source code | moneroexplorer