Monero Transaction 16780d1ef87970d85aa1dba326588deee8ac9382456585cf480852929bf38fa7

Autorefresh is OFF

Tx hash: 16780d1ef87970d85aa1dba326588deee8ac9382456585cf480852929bf38fa7

Tx prefix hash: a1e86db1e657103d58c08a658fcf6a92b5bc6f1cac6c3bd90d24a99df655e8bf
Tx public key: 256eb31619ea7dc16e492aa6223302bf420931e990fd47ce036fa3d5ebab2fda

Transaction 16780d1ef87970d85aa1dba326588deee8ac9382456585cf480852929bf38fa7 was carried out on the Monero network on 2015-09-02 00:26:32. The transaction has 2586841 confirmations. Total output fee is 0.050000000000 XMR.

Timestamp: 1441153592 Timestamp [UTC]: 2015-09-02 00:26:32 Age [y:d:h:m:s]: 09:113:17:13:35
Block: 721114 Fee (per_kB): 0.050000000000 (0.139130434783) Tx size: 0.3594 kB
Tx version: 1 No of confirmations: 2586841 RingCT/type: no
Extra: 01256eb31619ea7dc16e492aa6223302bf420931e990fd47ce036fa3d5ebab2fda

3 output(s) for total of 0.190000000000 xmr

stealth address amount amount idx tag
00: ce0edbfd16d4556151102571f5ddd051a9c869ea08efbb79126020d1780eef2d 0.010000000000 395042 of 502466 -
01: 7592532318955cb63196c8579f868c68051b217621873cc374a8195ebc2fcd5a 0.080000000000 155522 of 269576 -
02: 4dcff1e087e24e341e42525ffa2ba0fcf2f6220a88d682487caef4915abc9fbc 0.100000000000 800511 of 982315 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-09-01 22:41:08 till 2015-09-02 01:00:58; resolution: 0.00 days)

  • |_________________________________________________________________________*________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________*________________________________________________________________________|

2 inputs(s) for total of 0.240000000000 xmr

key image 00: 1babe0896fdf992b01690bebf6c359f1017f89b002aed454ea1150b124dcdb86 amount: 0.040000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 63d5aa09b628d75292169d5a2282af8534f4996aa01799c63f69b90345e73627 00721092 1 1/4 2015-09-01 23:41:08 09:113:17:58:59
key image 01: 0da7fd1d4ede03bf345d86bbfde86269522b73afd81f0aea3a6b081d27773b85 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 07e69efe2b7edc229831c257092e3bfebc7bd71b46a214b9abbeb7fd2684fea1 00721103 1 2/3 2015-09-02 00:00:58 09:113:17:39:09
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 40000000000, "key_offsets": [ 189221 ], "k_image": "1babe0896fdf992b01690bebf6c359f1017f89b002aed454ea1150b124dcdb86" } }, { "key": { "amount": 200000000000, "key_offsets": [ 985439 ], "k_image": "0da7fd1d4ede03bf345d86bbfde86269522b73afd81f0aea3a6b081d27773b85" } } ], "vout": [ { "amount": 10000000000, "target": { "key": "ce0edbfd16d4556151102571f5ddd051a9c869ea08efbb79126020d1780eef2d" } }, { "amount": 80000000000, "target": { "key": "7592532318955cb63196c8579f868c68051b217621873cc374a8195ebc2fcd5a" } }, { "amount": 100000000000, "target": { "key": "4dcff1e087e24e341e42525ffa2ba0fcf2f6220a88d682487caef4915abc9fbc" } } ], "extra": [ 1, 37, 110, 179, 22, 25, 234, 125, 193, 110, 73, 42, 166, 34, 51, 2, 191, 66, 9, 49, 233, 144, 253, 71, 206, 3, 111, 163, 213, 235, 171, 47, 218 ], "signatures": [ "d2cf4c0e47575db4712dfe82663ffb55a77bd4a85e47571a21a1789589d69a00a34cf7ad2cad8eea7af16ff6d574c529a6fa07a0497c3405e1dafd94c24e980b", "9ced4d4e71928ecbd697a3e3cadee319f8f13b88f7ec0d0539b65066cc592106428c24f934f6c6df7890556754b1303217d86a98992d571a788e0de8c32bd708"] }


Less details
source code | moneroexplorer