Monero Transaction 145e68b7140747bc952516a2d278f043de5a780cdd8c08fc8e51aac9a8a32139

Autorefresh is OFF

Tx hash: 145e68b7140747bc952516a2d278f043de5a780cdd8c08fc8e51aac9a8a32139

Tx prefix hash: 291f09925df36ecd9a0fe74973401094249cde0e69d85dadd314c8673e808bff
Tx public key: 2f5a87fedb4756b03ffd85aa4b0be8a8f62f111075b739b8893f735b115a3291

Transaction 145e68b7140747bc952516a2d278f043de5a780cdd8c08fc8e51aac9a8a32139 was carried out on the Monero network on 2014-11-15 16:43:02. The transaction has 2998738 confirmations. Total output fee is 0.200000000000 XMR.

Timestamp: 1416069782 Timestamp [UTC]: 2014-11-15 16:43:02 Age [y:d:h:m:s]: 10:034:23:44:10
Block: 306297 Fee (per_kB): 0.200000000000 (0.620606060606) Tx size: 0.3223 kB
Tx version: 1 No of confirmations: 2998738 RingCT/type: no
Extra: 012f5a87fedb4756b03ffd85aa4b0be8a8f62f111075b739b8893f735b115a3291

2 output(s) for total of 0.600000000000 xmr

stealth address amount amount idx tag
00: 7175c75d4418c62eb4e994cee443ee09f9035c8dff1448bc6cc3c9d93f278148 0.200000000000 621549 of 1272211 -
01: e3f1491edd5930706a6ff5d0eb2c2a72d8ac6a3f6a58783e81983016b93935b9 0.400000000000 276955 of 688584 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-11-12 10:07:50 till 2014-11-12 19:34:00; resolution: 0.00 days)

  • |__________________*_______________________________________________________________________________________________________________________________________________________|
  • |________________________________________________________________________________________________________________________________________________________*_________________|

2 inputs(s) for total of 0.800000000000 xmr

key image 00: 7153f95f5949ecc56bb5aa6b945542abba3f806431d976289fb56c9aa82c6547 amount: 0.600000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e0bbd7e35c5ed085d69ffe05400317be182924656c0eb04fad9b9e86b769a034 00301627 1 8/66 2014-11-12 11:07:50 10:038:05:19:22
key image 01: a2c922437b6bb81e4e70142dabe3c86df4d56f067d75128570f272af0e1bef28 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 21e6a2013d10a8050ee9706c54c745e4781b9abc91568d39efe3d3922d54b5fc 00302072 1 4/48 2014-11-12 18:34:00 10:037:21:53:12
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 600000000000, "key_offsets": [ 273081 ], "k_image": "7153f95f5949ecc56bb5aa6b945542abba3f806431d976289fb56c9aa82c6547" } }, { "key": { "amount": 200000000000, "key_offsets": [ 613523 ], "k_image": "a2c922437b6bb81e4e70142dabe3c86df4d56f067d75128570f272af0e1bef28" } } ], "vout": [ { "amount": 200000000000, "target": { "key": "7175c75d4418c62eb4e994cee443ee09f9035c8dff1448bc6cc3c9d93f278148" } }, { "amount": 400000000000, "target": { "key": "e3f1491edd5930706a6ff5d0eb2c2a72d8ac6a3f6a58783e81983016b93935b9" } } ], "extra": [ 1, 47, 90, 135, 254, 219, 71, 86, 176, 63, 253, 133, 170, 75, 11, 232, 168, 246, 47, 17, 16, 117, 183, 57, 184, 137, 63, 115, 91, 17, 90, 50, 145 ], "signatures": [ "8d81cd7a921c3bd78f876137b4d68afcf0d239b0c7567b14bcb366ebb2b29e01173fc7e949c15338db88119fbab3fa42ee26b335b10db633b8b6b221d9491700", "e480562b0a08d9a1352266676e2b52db9b1ac1a53759e2d3fa714750ba35e4006eaf6ef7a3174223bbe57e815b399d9ed343f9d859967047191449fb4101730c"] }


Less details
source code | moneroexplorer