Monero Transaction 0d2b2301c81d629a1a8178143e83c32134a613689e1e05309f2db4ff6b4d7d0a

Autorefresh is OFF

Tx hash: 0d2b2301c81d629a1a8178143e83c32134a613689e1e05309f2db4ff6b4d7d0a

Tx prefix hash: 468bee2daea827b77820074bba7a313648a933f31e266d43285c3b5498529b9c
Tx public key: 1a09dfa50b288f7dfb50f8aa6b0257258c6784cd8d062e3c043874c0861268d7

Transaction 0d2b2301c81d629a1a8178143e83c32134a613689e1e05309f2db4ff6b4d7d0a was carried out on the Monero network on 2014-05-26 09:04:04. The transaction has 3221043 confirmations. Total output fee is 0.000001719930 XMR.

Timestamp: 1401095044 Timestamp [UTC]: 2014-05-26 09:04:04 Age [y:d:h:m:s]: 10:170:22:19:52
Block: 57131 Fee (per_kB): 0.000001719930 (0.000001782600) Tx size: 0.9648 kB
Tx version: 1 No of confirmations: 3221043 RingCT/type: no
Extra: 011a09dfa50b288f7dfb50f8aa6b0257258c6784cd8d062e3c043874c0861268d7

14 output(s) for total of 4.080003052054 xmr

stealth address amount amount idx tag
00: 155b03cc0f49559a4ad5e7c992ae840708b8a82d6360b745cfa1b97876a9183b 0.000000052054 0 of 1 -
01: 17d47b73d19704ea5f0bbd42a2dcb805886e0b13349e2e731379d31b57187e42 0.000003000000 10586 of 42340 -
02: bb7369e50ef0270ff2c89531c3ee5dc46532e6c978b023d38b17351a0aca8a04 0.000030000000 18511 of 59483 -
03: 22583b491ca15142ae9ed2e4ac798080a0714a48d98c1a538e9c98ce0a1b4416 0.000070000000 18456 of 59071 -
04: fcf6d771eefa76616267a7bb504f0681d67ab6dadda76b7c997f26b1134ff121 0.000400000000 18359 of 77134 -
05: 09634a639e6dec28608c6bf845665bdd1355f402002beaed0dd45bd3ef0f1b92 0.000500000000 18465 of 77939 -
06: 18c586bbc9026248fa040446090530a33fc8ccceb1ac40ec89508ff250d926ac 0.002000000000 20952 of 95915 -
07: dc7ca314a2a0365ee231ea3cdc4a5632b87642dce3137ade06d1235a82499446 0.007000000000 15800 of 247340 -
08: c5aee5e1efab0b2df9206887c1975e6e48a63d537cdf83b74240d88877349656 0.020000000000 18014 of 381491 -
09: 9b856c47fef764ba4d5d3b2434c71904b9a6dda5b7eb85f4a418f6c0b6a027f9 0.050000000000 10889 of 284521 -
10: cb749f1771b05e37aab4369937cec08c37615c294400f80708c5e57718b3ab0e 0.200000000000 10010 of 1272210 -
11: bfcfb4d32a877036948fa96f2251513c6e005f7fcff9b93efc06977393f0fd0b 0.800000000000 7506 of 489955 -
12: efed800ccf3436b4304812900a6ed057ffdeace680fd55a7563d225b9cede0e7 1.000000000000 3479 of 874629 -
13: 0319e02b19f64514eab827ab4f02fb030259a35585932944256f067797c6e575 2.000000000000 1630 of 434057 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-24 17:11:56 till 2014-05-26 08:58:10; resolution: 0.01 days)

  • |_____________________________________________________________________________________________________________________________________________________________________*____|
  • |_____*____________________________________________________________________________________________________________________________________________________________________|
  • |______________________________________________________________________________________________________________________________________*___________________________________|
  • |_____________________________________________________________________________________________________________________________________________________________________*____|

4 inputs(s) for total of 4.080004771984 xmr

key image 00: 9ba0f924cf645a4f8f3d2eaf6eea88f91c78d0e58dc76bc2894a7558321fa3cd amount: 0.000000771984
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3dedcfc86ea9792a4cf5de99c81a497c60270c6130815520dcf8c39748704069 00057052 0 0/9 2014-05-26 07:58:10 10:170:23:25:46
key image 01: 0ae437cb638204245692c83552142a2975c360381c966db5336f4446be75d260 amount: 0.000004000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 800ea951d7b1156ac4402ad1ff6487fc5afc64ff8b5d863170daa8a061656280 00054822 1 11/7 2014-05-24 18:11:56 10:172:13:12:00
key image 02: 0f35155d337b0f19383e112f74b258ba1438de25102bb31489ed322b51c8a8ca amount: 0.080000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5cd8245a2dcab69001acb4c10f71af44f87160e5ebc3c6a03c7b05a7736a15b3 00056599 0 0/9 2014-05-26 00:40:42 10:171:06:43:14
key image 03: dbcb2a244bfbe37c1468b91b6b8d8bbbf4953797bb5482cdc07bef5cdf31c010 amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c99f94de27588b30ac4ac61532599493b652781d838f23fa3d9bbc681ca4b0c5 00057043 1 3/13 2014-05-26 07:49:28 10:170:23:34:28
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 771984, "key_offsets": [ 0 ], "k_image": "9ba0f924cf645a4f8f3d2eaf6eea88f91c78d0e58dc76bc2894a7558321fa3cd" } }, { "key": { "amount": 4000000, "key_offsets": [ 8853 ], "k_image": "0ae437cb638204245692c83552142a2975c360381c966db5336f4446be75d260" } }, { "key": { "amount": 80000000000, "key_offsets": [ 9302 ], "k_image": "0f35155d337b0f19383e112f74b258ba1438de25102bb31489ed322b51c8a8ca" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 1423 ], "k_image": "dbcb2a244bfbe37c1468b91b6b8d8bbbf4953797bb5482cdc07bef5cdf31c010" } } ], "vout": [ { "amount": 52054, "target": { "key": "155b03cc0f49559a4ad5e7c992ae840708b8a82d6360b745cfa1b97876a9183b" } }, { "amount": 3000000, "target": { "key": "17d47b73d19704ea5f0bbd42a2dcb805886e0b13349e2e731379d31b57187e42" } }, { "amount": 30000000, "target": { "key": "bb7369e50ef0270ff2c89531c3ee5dc46532e6c978b023d38b17351a0aca8a04" } }, { "amount": 70000000, "target": { "key": "22583b491ca15142ae9ed2e4ac798080a0714a48d98c1a538e9c98ce0a1b4416" } }, { "amount": 400000000, "target": { "key": "fcf6d771eefa76616267a7bb504f0681d67ab6dadda76b7c997f26b1134ff121" } }, { "amount": 500000000, "target": { "key": "09634a639e6dec28608c6bf845665bdd1355f402002beaed0dd45bd3ef0f1b92" } }, { "amount": 2000000000, "target": { "key": "18c586bbc9026248fa040446090530a33fc8ccceb1ac40ec89508ff250d926ac" } }, { "amount": 7000000000, "target": { "key": "dc7ca314a2a0365ee231ea3cdc4a5632b87642dce3137ade06d1235a82499446" } }, { "amount": 20000000000, "target": { "key": "c5aee5e1efab0b2df9206887c1975e6e48a63d537cdf83b74240d88877349656" } }, { "amount": 50000000000, "target": { "key": "9b856c47fef764ba4d5d3b2434c71904b9a6dda5b7eb85f4a418f6c0b6a027f9" } }, { "amount": 200000000000, "target": { "key": "cb749f1771b05e37aab4369937cec08c37615c294400f80708c5e57718b3ab0e" } }, { "amount": 800000000000, "target": { "key": "bfcfb4d32a877036948fa96f2251513c6e005f7fcff9b93efc06977393f0fd0b" } }, { "amount": 1000000000000, "target": { "key": "efed800ccf3436b4304812900a6ed057ffdeace680fd55a7563d225b9cede0e7" } }, { "amount": 2000000000000, "target": { "key": "0319e02b19f64514eab827ab4f02fb030259a35585932944256f067797c6e575" } } ], "extra": [ 1, 26, 9, 223, 165, 11, 40, 143, 125, 251, 80, 248, 170, 107, 2, 87, 37, 140, 103, 132, 205, 141, 6, 46, 60, 4, 56, 116, 192, 134, 18, 104, 215 ], "signatures": [ "86b096a8a707970cbbf8fe751b8ba9cfe1a66fc88cce8b32e8c026e21b9b9f037e62982be95f92dd50364f535974e758dd73b411bb541f26f750a9465c016901", "7026edcc64abac77484200c9456a488d99ea8e7936609f803cea9a256a6c010528f4815c9a7ec07dde00b5e32abd442825fecd50a78b6645eea808239242f101", "4b555e9e4810e94dc214430f5ea53dd57c42635fc6729579693c04ed3213d705de56718b40b4a55b1a775fe538a4448905d61c38d114724c21c2119401c0ee0b", "e72f512fd83daba6b23f508d37b94a8a4ec27aec10a908a03f473d99762773072d0ddc7eb7a1aaab0388ec4042b948c656f9985fd57171729af007dd69f2ab03"] }


Less details
source code | moneroexplorer