Monero Transaction 02b0d30b94a28ba9380678839b07795ff3f57d32ce2cf20f08f503006504ad05

Autorefresh is OFF

Tx hash: b0f83d8eeb5245f1391b36053b0469b5d6d04a76711a0878e9b3e1226aaed3fa

Tx prefix hash: d8357835be1ef3d7ea168c8f7a64654b89caa1a6641d04f50416a113472a5e26
Tx public key: 68bfd8189aae81c046021e670866bca507775f10bab81d6b30cf9c457cda0a91
Payment id (encrypted): 90d35148dbc4b354

Transaction b0f83d8eeb5245f1391b36053b0469b5d6d04a76711a0878e9b3e1226aaed3fa was carried out on the Monero network on N/A. The transaction has 0 confirmations. Total output fee is 0.000030720000 XMR.

Timestamp: 0 Timestamp [UTC]: N/A Age [y:d:h:m:s]:
Block: N/A Fee (per_kB): 0.000030720000 (0.000110376421) Tx size: 0.2783 kB
Tx version: 2 No of confirmations: 0 RingCT/type: yes/6
Extra: 0168bfd8189aae81c046021e670866bca507775f10bab81d6b30cf9c457cda0a9102090190d35148dbc4b354

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: e631df0d83cda5a398bcd89acbd1dbbd201bfad75620e5d540d02461d3c65fdc ? N/A of 126016156 <5a>
01: 0e3a218b6622d4107a998b33fd9232814ee4b0b0f43c5119e457d50ecf2cba7e ? N/A of 126016156 <15>

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2022-12-12 10:47:37 till 2024-11-15 15:33:02; resolution: 4.14 days)

  • |_*___________________________________________________________________*________________________*_________________________________________________________________________**|

1 input(s) for total of ? xmr

key image 00: 28e00e4916fbef1cff53498ac4826469f532d98aa39a99cec04b1a0a213c90ff amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5cfae0dcdb86255bc35fa9773fa2120ade4b1804525dff08e5b17ea9387a6b50 02775645 16 2/2 2022-12-12 11:47:37 02:067:08:47:27
- 01: c50d00216ab8cd51ecd6836c91edb8688bcad50b7e9c5f411f80b05c20be5b1e 02982126 16 1/2 2023-09-25 17:10:42 01:145:03:24:22
- 02: 9afb71c4217d46e38d27de28d40d2ded5ba5c7bb2617e6071a1418f59217e5df 03056797 16 1/2 2024-01-07 15:28:09 01:041:05:06:55
- 03: 421d6fd9020b8b131cc9449c54af7bd5d6de72bf915d514ad02114f7d14911cd 03277253 16 2/11 2024-11-09 01:57:51 00:099:18:37:13
- 04: 7ad7ef4616c440276c411da775773edab7367be2ff3793008ee5bb25fa108631 03279237 16 1/2 2024-11-11 18:59:51 00:097:01:35:13
- 05: 6ab37d58a3c4f394a11216641c55d32a93d98af4d214b285404efce8b278a56b 03279789 16 1/2 2024-11-12 14:45:09 00:096:05:49:55
- 06: e923306b31b98aef5d08108c59ffcc9a43ddc3da0cbbd2c860e911e3fe6e295b 03279899 16 2/4 2024-11-12 18:29:41 00:096:02:05:23
- 07: 1c976279df894e26e83f71874534eafb8a503949adeb8c7eaee15689e14e05e4 03280628 16 2/2 2024-11-13 17:46:55 00:095:02:48:09
- 08: 9fb97e66685f92386ee7aa11d2d711da1464fe26ddfc8ad0974cab80a99e1393 03280747 16 1/2 2024-11-13 21:53:34 00:094:22:41:30
- 09: 03703df4a8393e1c929430771d0b33f0eea56fff81a3a5425492f0265407f8a6 03280867 16 1/2 2024-11-14 01:46:21 00:094:18:48:43
- 10: 71c32a8835542af0edd2da7fd64b72ff157c70a118b3c3e7fb9c868ac48a03df 03281119 16 6/2 2024-11-14 10:35:42 00:094:09:59:22
- 11: a0ff3ace1c6e1620f74f8d6a532c299481d9e244d532a05c4fbd78a24a89a586 03281304 16 1/6 2024-11-14 16:04:01 00:094:04:31:03
- 12: 6db9379187beafb294499c16930252eaa10517c77fe602548d7bb1a363322f08 03281724 16 2/2 2024-11-15 06:21:35 00:093:14:13:29
- 13: 99174d039e230df7c930410958dc628d721e4573ce4faa28ae247f0047cf3b7e 03281763 16 1/2 2024-11-15 08:06:39 00:093:12:28:25
- 14: 8f0dc5b9f8e604c23a170bd58cda9ebce2f04ac309f89128ecabb6469c33aed8 03281901 16 1/16 2024-11-15 13:00:14 00:093:07:34:50
- 15: 03d6f318ffafecd776bf316c2cec8115122e75028b2a2e3dfa21f25849fa0417 03281941 16 1/2 2024-11-15 14:33:02 00:093:06:02:02
{ "version": 2, "unlock_time": 0, "vin": [ { "key": { "amount": 0, "key_offsets": [ 65803318, 14952377, 6499870, 31698376, 203536, 64847, 14519, 79339, 14735, 11957, 24317, 20394, 44256, 4296, 16183, 5864 ], "k_image": "28e00e4916fbef1cff53498ac4826469f532d98aa39a99cec04b1a0a213c90ff" } } ], "vout": [ { "amount": 0, "target": { "tagged_key": { "key": "e631df0d83cda5a398bcd89acbd1dbbd201bfad75620e5d540d02461d3c65fdc", "view_tag": "5a" } } }, { "amount": 0, "target": { "tagged_key": { "key": "0e3a218b6622d4107a998b33fd9232814ee4b0b0f43c5119e457d50ecf2cba7e", "view_tag": "15" } } } ], "extra": [ 1, 104, 191, 216, 24, 154, 174, 129, 192, 70, 2, 30, 103, 8, 102, 188, 165, 7, 119, 95, 16, 186, 184, 29, 107, 48, 207, 156, 69, 124, 218, 10, 145, 2, 9, 1, 144, 211, 81, 72, 219, 196, 179, 84 ], "rct_signatures": { "type": 6, "txnFee": 30720000, "ecdhInfo": [ { "trunc_amount": "3a4a04ad22b7c512" }, { "trunc_amount": "920982e17e06df50" }], "outPk": [ "f922b26ab7a22b9c00d5c24ee9ad4cdf6fdab26ac68e910eea05b94c37168feb", "b520f1a6781240fff0a100c9b6f3c64c8f67fd48a520c8925c6130f0e18f3c3d"] } }


Less details
source code | moneroexplorer