Monero Transaction 0dd1db9e0703765549113328e1513075177550a9761bfe5ee43b7a727dffbe1e

Autorefresh is OFF

Tx hash: 0dd1db9e0703765549113328e1513075177550a9761bfe5ee43b7a727dffbe1e

Tx prefix hash: e53eed6ad39564158cef34759f46a620cce938d61f54eb6995b3467913b6b513
Tx public key: 27c3d3c202fe8f63feab638ba14ff344cc51bb583d7d42a305f3d8164295c15b
Payment id: 5c18c6da91c7589b3e1472c7814dd711327fa0575753f9322247f8a594d654fa

Transaction 0dd1db9e0703765549113328e1513075177550a9761bfe5ee43b7a727dffbe1e was carried out on the Monero network on 2016-10-06 10:03:40. The transaction has 2150860 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1475748220 Timestamp [UTC]: 2016-10-06 10:03:40 Age [y:d:h:m:s]: 08:070:11:35:44
Block: 1151427 Fee (per_kB): 0.010000000000 (0.013635153129) Tx size: 0.7334 kB
Tx version: 1 No of confirmations: 2150860 RingCT/type: no
Extra: 0221005c18c6da91c7589b3e1472c7814dd711327fa0575753f9322247f8a594d654fa0127c3d3c202fe8f63feab638ba14ff344cc51bb583d7d42a305f3d8164295c15b

5 output(s) for total of 10.060000000000 xmr

stealth address amount amount idx tag
00: 470602f6ad205a4166eff1cdcad4770e7a129b46554b8ced9f56360a4b2eb614 0.060000000000 232228 of 264760 -
01: 92e8996a22abb87c7996aa51ae18ce605cf225e09db1e1cf202c1644de483f4f 0.100000000000 925081 of 982315 -
02: ba38fda57b262d4c84dbee36e10a7a29e60e153f66c05134a2c339ad8f83b91a 0.900000000000 405285 of 454894 -
03: ed9045e1204b9fac442a834177625f4d4e2e18fd80b4d8a161272668ae57ee69 4.000000000000 216664 of 237197 -
04: 1df5319d4f2389856c89592aa4d19db58a8360d22b3a09182bae01e1e28e8ea8 5.000000000000 231301 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-22 08:30:29 till 2016-10-06 02:31:12; resolution: 4.92 days)

  • |_*____*__________________________________________________________________________________________________________________________________________________________________*|
  • |_______________________________*______________________*__________________________________________________________________________________________________________________*|

2 inputs(s) for total of 10.070000000000 xmr

key image 00: 578e69d06ff991f304609e014b039a132ece3f64141869971a7b2b682ee5ae85 amount: 0.070000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a51abcb4cdb86786cf0c41bf88b3b38ecdbb7c6f1e1669ca00ad8a3df341460b 00096466 1 8/134 2014-06-22 09:30:29 10:177:12:08:55
- 01: 98dba3817ea1722969ec01807ee18e8c24b5c57009131bef4dd88b5dc9361c29 00136924 0 0/6 2014-07-20 10:37:18 10:149:11:02:06
- 02: f05eb2285c0c70ae7d304ef7d9b8df3e04583a47ca8c168079c3ef76b3002f56 01150882 3 2/5 2016-10-05 14:32:10 08:071:07:07:14
key image 01: c745a42427de081d1ceadcafb382616fc8535e7f645d537aa89f0abbd73e0684 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6da715bfcccc4865efc3d83af5a7150a136ec9a2134649b28713c92844a6c337 00314362 0 0/3 2014-11-21 08:44:19 10:025:12:55:05
- 01: 0efc070ab8d56b92640938936eb444735414e8328551731e9a3c3bb374bbfb02 00475204 0 0/4 2015-03-13 22:11:55 09:277:23:27:29
- 02: 3c7bb95cc5f451ba4e1f9d61497f47ee16a0401abd2a3f969b692f12fb594195 01151170 0 0/4 2016-10-06 01:31:12 08:070:20:08:12
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 70000000000, "key_offsets": [ 74056, 10790, 143008 ], "k_image": "578e69d06ff991f304609e014b039a132ece3f64141869971a7b2b682ee5ae85" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 365318, 179493, 339584 ], "k_image": "c745a42427de081d1ceadcafb382616fc8535e7f645d537aa89f0abbd73e0684" } } ], "vout": [ { "amount": 60000000000, "target": { "key": "470602f6ad205a4166eff1cdcad4770e7a129b46554b8ced9f56360a4b2eb614" } }, { "amount": 100000000000, "target": { "key": "92e8996a22abb87c7996aa51ae18ce605cf225e09db1e1cf202c1644de483f4f" } }, { "amount": 900000000000, "target": { "key": "ba38fda57b262d4c84dbee36e10a7a29e60e153f66c05134a2c339ad8f83b91a" } }, { "amount": 4000000000000, "target": { "key": "ed9045e1204b9fac442a834177625f4d4e2e18fd80b4d8a161272668ae57ee69" } }, { "amount": 5000000000000, "target": { "key": "1df5319d4f2389856c89592aa4d19db58a8360d22b3a09182bae01e1e28e8ea8" } } ], "extra": [ 2, 33, 0, 92, 24, 198, 218, 145, 199, 88, 155, 62, 20, 114, 199, 129, 77, 215, 17, 50, 127, 160, 87, 87, 83, 249, 50, 34, 71, 248, 165, 148, 214, 84, 250, 1, 39, 195, 211, 194, 2, 254, 143, 99, 254, 171, 99, 139, 161, 79, 243, 68, 204, 81, 187, 88, 61, 125, 66, 163, 5, 243, 216, 22, 66, 149, 193, 91 ], "signatures": [ "794e8086366ac4adf580093712136297783a705d2f36fa7eb89ef581cae89e0d996d0a34549d46cb8a32b4f1d028112a3310f840f716ad5924095321ad4ef9053db37f238698e897b1d13c4597f198cd2fbe5054535ab602405165ff4c7053054467bf1b6f30a6eba86eec200876e3a3abb63a2e7a21b88a765e240584f5cf0fc888f65e04b4fd2f307e114c3a9d72ad0752fdfa366e33ec03491fceea302e071eb7c8504cc0d40bff96b0093ecc5f071ea41bb5b8638dfc06a2b4be9a7b3b0f", "ee5971b7225e4425af28d64890bcdc395aed8abff98e0fed8e219b4ec990c502afac3d0be6615ff117f18a63fd9e54ca1e02825058ef7767f35f01ded4bf3506524feefea7eda156364533d88e911db23cbd780538c87a4376633d5dee37ec03b5d27928e0d4e28a7b419776acae5958e78b81ebf2b9778c4545e70ddec3560ae0bead8650b25da2e2893293e26069e11dc9bdf4350919949ece119c0731e30083ce59e53f920b28b647f1696386dc521f9ad21267453e263801fb060f534a06"] }


Less details
source code | moneroexplorer