Monero Transaction 0b979323d98ddcff5427b12f1137243c77645273b84601631b6a8b6aaa1a503d

Autorefresh is OFF

Tx hash: 0b979323d98ddcff5427b12f1137243c77645273b84601631b6a8b6aaa1a503d

Tx prefix hash: a8f5ca6224da3c41c456dcfadf3b8703472155e36cbb3926ca29a6abbdbccbfb
Tx public key: 7f1e669d68b924aa0ceb239bc94016cd952a65d228ee8a03e358fef2f54b21ea
Payment id: 4cb0dd39f08547606de0055a5700519fd63d0607f78d489bd4ee97e949c771f6

Transaction 0b979323d98ddcff5427b12f1137243c77645273b84601631b6a8b6aaa1a503d was carried out on the Monero network on 2014-09-12 20:26:18. The transaction has 3095489 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1410553578 Timestamp [UTC]: 2014-09-12 20:26:18 Age [y:d:h:m:s]: 10:106:12:53:44
Block: 215101 Fee (per_kB): 0.100000000000 (0.283656509695) Tx size: 0.3525 kB
Tx version: 1 No of confirmations: 3095489 RingCT/type: no
Extra: 0221004cb0dd39f08547606de0055a5700519fd63d0607f78d489bd4ee97e949c771f6017f1e669d68b924aa0ceb239bc94016cd952a65d228ee8a03e358fef2f54b21ea

2 output(s) for total of 0.300020000000 xmr

stealth address amount amount idx tag
00: e19c900e4bcc157d8ae08225f92c7729693cfdba307f731b33856954cad62ec1 0.000020000000 35729 of 59482 -
01: 39ffb62078b992e8684ece67dde12abbea7b89c412f87ec946821593c70b4476 0.300000000000 226015 of 976536 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-09-11 17:06:09 till 2014-09-12 21:02:48; resolution: 0.01 days)

  • |___________________________________________________________________________________________________________________________________________________________________*______|
  • |_______*__________________________________________________________________________________________________________________________________________________________________|

2 inputs(s) for total of 0.400020000000 xmr

key image 00: b8b1af1109de234eca75c355ee3df15fd2d60aa2fda0d1f678608589de510f68 amount: 0.000020000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 908f858f3f40f2e01e3023b1eb9e4c5a689afcd646b67fefa680f0e761115c29 00215083 1 1/2 2014-09-12 20:02:48 10:106:13:17:14
key image 01: d4a81ec246f4ec08fb563afefa689f4a8462823b591da8d4b4137133a6e95692 amount: 0.400000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: bfe6c51a4c4d42daaf77951feaf2bd8ac36cd09c4d18fc7907536f245f9dcf8a 00213513 1 2/3 2014-09-11 18:06:09 10:107:15:13:53
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 20000000, "key_offsets": [ 35728 ], "k_image": "b8b1af1109de234eca75c355ee3df15fd2d60aa2fda0d1f678608589de510f68" } }, { "key": { "amount": 400000000000, "key_offsets": [ 205987 ], "k_image": "d4a81ec246f4ec08fb563afefa689f4a8462823b591da8d4b4137133a6e95692" } } ], "vout": [ { "amount": 20000000, "target": { "key": "e19c900e4bcc157d8ae08225f92c7729693cfdba307f731b33856954cad62ec1" } }, { "amount": 300000000000, "target": { "key": "39ffb62078b992e8684ece67dde12abbea7b89c412f87ec946821593c70b4476" } } ], "extra": [ 2, 33, 0, 76, 176, 221, 57, 240, 133, 71, 96, 109, 224, 5, 90, 87, 0, 81, 159, 214, 61, 6, 7, 247, 141, 72, 155, 212, 238, 151, 233, 73, 199, 113, 246, 1, 127, 30, 102, 157, 104, 185, 36, 170, 12, 235, 35, 155, 201, 64, 22, 205, 149, 42, 101, 210, 40, 238, 138, 3, 227, 88, 254, 242, 245, 75, 33, 234 ], "signatures": [ "47d9b52925d324e5a3852840ad821a2478a0cd6bb1cbb14a7928d8dc0f0beb0f6442589593d9966c1f68cc9aaccc7d99b6da2905710352ca74f86c1c7cc02a06", "35ede20598ec44beb4e6381692d7d2b28aa0488ac07cf9f5661d1f6305b878029c24c528df47dc5c23250931b793ca3913d1f8b85294db1511c2e0667a8be009"] }


Less details
source code | moneroexplorer