Monero Transaction 1d0b093245f72cf0c987d6ef497cc4736582e8fb730696e07706bd3ab0787bed

Autorefresh is OFF

Tx hash: 1d0b093245f72cf0c987d6ef497cc4736582e8fb730696e07706bd3ab0787bed

Tx prefix hash: 1fb78a22b6b4859b120fed76d5c3a3da9146e1638debd627297ce3796820e211
Tx public key: d13152ded3b0fb1ed7e1349d4fb307af4f0bbef5a090bb698d0f4e60c696116c

Transaction 1d0b093245f72cf0c987d6ef497cc4736582e8fb730696e07706bd3ab0787bed was carried out on the Monero network on 2016-10-04 07:13:48. The transaction has 2155114 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1475565228 Timestamp [UTC]: 2016-10-04 07:13:48 Age [y:d:h:m:s]: 08:076:08:32:40
Block: 1149902 Fee (per_kB): 0.010000000000 (0.013653333333) Tx size: 0.7324 kB
Tx version: 1 No of confirmations: 2155114 RingCT/type: no
Extra: 01d13152ded3b0fb1ed7e1349d4fb307af4f0bbef5a090bb698d0f4e60c696116cde209b9e415098810f1491fd067677633b0dd8c7039fe671820fef0b912893734ba5

5 output(s) for total of 9.490000000000 xmr

stealth address amount amount idx tag
00: 897d19fd0ffeaf7c5af4f85afc444fb151c3865a2618f6577f899e78c258f8fb 0.020000000000 345436 of 381492 -
01: a31939dab95e1558a13e308891ceac64ffb56fb527c81be06c86b3f1248527b4 0.070000000000 227494 of 263947 -
02: 9a54eed43eab64f58d3ba41957f165b0ba0d1019877bf62b3e83695a570cf2a7 0.500000000000 1057734 of 1118624 -
03: dcd24475472360af3714bc2cdddbb6d33b0aeea91808746360a9e256afdfa154 0.900000000000 404443 of 454894 -
04: fe50563ec53993ed205e3eacf471d1667b896bd291a66a0cb390aec214a1af85 8.000000000000 207012 of 226902 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-08-30 11:05:21 till 2016-10-04 07:32:50; resolution: 4.51 days)

  • |_*______________________________*________________________________________________________________________________________________________________________________________*|
  • |___________________*______________________________________________*______________________________________________________________________________________________________*|

2 inputs(s) for total of 9.500000000000 xmr

key image 00: 2637d62693939c36c36ab5e907417acba50ce7495cea279320fcabe6edb34a29 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a7ca2bf6deafc473f06c1504cfab7d3339247ca598fc7b5baff8cb9775b1eaf7 00196024 3 31/141 2014-08-30 12:05:21 10:112:03:41:07
- 01: e1f034c5d253d10a06bf3585b93a6f417e5c5d326867ed6bddca07aa00b68439 00399774 1 17/53 2015-01-20 07:24:10 09:334:08:22:18
- 02: 926e6154c2c0df356737b1046ede675b0018200697b8c40278f529d749e6d033 01149884 3 6/23 2016-10-04 06:32:50 08:076:09:13:38
key image 01: 5ff30878c32f2314a4a118b7c373445fa184bef7168054a822c92a0f229f1c0c amount: 9.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 97bf7658de4c65e212dec384c753a05547af24eb7eee234c0dea4272fe69a8ab 00317669 1 5/93 2014-11-23 16:03:30 10:026:23:42:58
- 01: ea3a39fa7943ab2c671eadb35959b328bc672254a9ae4bfe2ed39f781c7e4100 00619336 0 0/4 2015-06-22 16:03:17 09:180:23:43:11
- 02: f7212f11a12d7107da5ef860c8222490df5387adebb71d9abc88061ded104c21 01149879 3 3/24 2016-10-04 06:25:51 08:076:09:20:37
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 500000000000, "key_offsets": [ 269051, 329831, 458843 ], "k_image": "2637d62693939c36c36ab5e907417acba50ce7495cea279320fcabe6edb34a29" } }, { "key": { "amount": 9000000000000, "key_offsets": [ 26959, 42297, 131994 ], "k_image": "5ff30878c32f2314a4a118b7c373445fa184bef7168054a822c92a0f229f1c0c" } } ], "vout": [ { "amount": 20000000000, "target": { "key": "897d19fd0ffeaf7c5af4f85afc444fb151c3865a2618f6577f899e78c258f8fb" } }, { "amount": 70000000000, "target": { "key": "a31939dab95e1558a13e308891ceac64ffb56fb527c81be06c86b3f1248527b4" } }, { "amount": 500000000000, "target": { "key": "9a54eed43eab64f58d3ba41957f165b0ba0d1019877bf62b3e83695a570cf2a7" } }, { "amount": 900000000000, "target": { "key": "dcd24475472360af3714bc2cdddbb6d33b0aeea91808746360a9e256afdfa154" } }, { "amount": 8000000000000, "target": { "key": "fe50563ec53993ed205e3eacf471d1667b896bd291a66a0cb390aec214a1af85" } } ], "extra": [ 1, 209, 49, 82, 222, 211, 176, 251, 30, 215, 225, 52, 157, 79, 179, 7, 175, 79, 11, 190, 245, 160, 144, 187, 105, 141, 15, 78, 96, 198, 150, 17, 108, 222, 32, 155, 158, 65, 80, 152, 129, 15, 20, 145, 253, 6, 118, 119, 99, 59, 13, 216, 199, 3, 159, 230, 113, 130, 15, 239, 11, 145, 40, 147, 115, 75, 165 ], "signatures": [ "1527dceb907aada1a3ad2a100c45355bfa87e5357830e593c0c7fe7c5f0d480034751e906af1ea931bcfc917eb0123da7439946124942d6787e2cd5166250b00162c8100eef51af73ccfbfcaa66ece21c97e391970cb008f4393c1d4d28bfa009f5a36d89772b53cebb896d96344bf8393095ec43b21bf546d2e3956f16c96055e80100b813095002aaaa00b4779926f43f299eb191d3025dcddc5c851a37505ea47955ac767eab5e4733b5551ba0a52677329671e4e4cbf0aba28577d8e0e02", "c7a66916dca7d88d40f0d00263addae01cbb91269bb06a7f9bc5d0c0dfe4c80de25931d86b9d804da8a20610c6e756cc5e37c3f00c3ea0cc63481d80d092a50162d55cd8b633b95bc06ae8017cd950288fd3b7a080c22978a808eb1a261dd203443a2948c54f52f1f4174825bf46d8346883a345825613e67171f25c10e0c2034c6c5001485884cd05ea3a2045e95829e3696527686f81962ef7e45d8e429405f14dde5ede65d7905aa8e5c78d0e5863b3ef3e325e2998aa1d5f6a55c2874e00"] }


Less details
source code | moneroexplorer