Monero Transaction 0b07a2b51587ff0002e1108fe1f86e7887de3274fc521f5520b873721456dc89

Autorefresh is OFF

Tx hash: 0b07a2b51587ff0002e1108fe1f86e7887de3274fc521f5520b873721456dc89

Tx prefix hash: acebc05381a4992ea11596b7ecd1670fa1a79e89c4a7ea82c1f96aefd4d51e11
Tx public key: ba2d7625d62a575a44dd1fcd6de800eb65f53caf194d773d5b8d096d6486c424

Transaction 0b07a2b51587ff0002e1108fe1f86e7887de3274fc521f5520b873721456dc89 was carried out on the Monero network on 2015-02-15 14:59:42. The transaction has 2867467 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1424012382 Timestamp [UTC]: 2015-02-15 14:59:42 Age [y:d:h:m:s]: 09:308:00:07:22
Block: 437526 Fee (per_kB): 0.100000000000 (0.351890034364) Tx size: 0.2842 kB
Tx version: 1 No of confirmations: 2867467 RingCT/type: no
Extra: 01ba2d7625d62a575a44dd1fcd6de800eb65f53caf194d773d5b8d096d6486c424

1 output(s) for total of 0.300000000000 xmr

stealth address amount amount idx tag
00: c0807316996d9c62590e0b77f0ad690ab38785522a2ac9ef9d97c28c2e5fa0b3 0.300000000000 452336 of 976536 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-02-12 14:46:06 till 2015-02-12 17:46:45; resolution: 0.00 days)

  • |_________________________________________________________________________________________________________________*________________________________________________________|
  • |_________________________________________________________*________________________________________________________________________________________________________________|

2 inputs(s) for total of 0.400000000000 xmr

key image 00: 192d8c29115c2c37aa71f7315a2b22ceeb5a7e7bbd295a58e3f8f0c856e028dd amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ebead0b5ff1fbe2c83126b948be906c5f2932016c2909a83b8675e099289d791 00433297 1 12/52 2015-02-12 16:46:45 09:310:22:20:19
key image 01: a608fdd7991d2ccf5004f9114882443dfb7395ea19c89e096842bb54acd5e9cc amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c906ce6e0bac016a670468613c3cec5da8006b0f4e6f3491f0fd3147d1e332a8 00433238 1 5/54 2015-02-12 15:46:06 09:310:23:20:58
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 200000000000, "key_offsets": [ 779670 ], "k_image": "192d8c29115c2c37aa71f7315a2b22ceeb5a7e7bbd295a58e3f8f0c856e028dd" } }, { "key": { "amount": 200000000000, "key_offsets": [ 779610 ], "k_image": "a608fdd7991d2ccf5004f9114882443dfb7395ea19c89e096842bb54acd5e9cc" } } ], "vout": [ { "amount": 300000000000, "target": { "key": "c0807316996d9c62590e0b77f0ad690ab38785522a2ac9ef9d97c28c2e5fa0b3" } } ], "extra": [ 1, 186, 45, 118, 37, 214, 42, 87, 90, 68, 221, 31, 205, 109, 232, 0, 235, 101, 245, 60, 175, 25, 77, 119, 61, 91, 141, 9, 109, 100, 134, 196, 36 ], "signatures": [ "17225b6141cbcc9de285e5d43fb367e57fdd15f6d9508665f65fc575a62fb603ac96524e5a09105f05564ed047c4ffb479ca23af875ede9f2c4ac9c2c77bb000", "2cf2029c485f1bd139e9dcb07aa6bfb193b7fd843d2762b80879a9ef84073c0f51236051644ed0799f6ef27025e42d0107ffd3045c73423820fe6d8ae4e95c0c"] }


Less details
source code | moneroexplorer