Monero Transaction 2a0a30ddb94e1bb683470dc6b24051af68efd2c5029365dddd4e8bc0d65b572b

Autorefresh is OFF

Tx hash: 2a0a30ddb94e1bb683470dc6b24051af68efd2c5029365dddd4e8bc0d65b572b

Tx prefix hash: 6dc067f721b7d040fcede54f8add8058e055d2a8a980e6a01446e1a525634eb9
Tx public key: c0a528b04356920f497bfab95aa0b5f3ac4adadbffdf137304a7797e899894c6

Transaction 2a0a30ddb94e1bb683470dc6b24051af68efd2c5029365dddd4e8bc0d65b572b was carried out on the Monero network on 2016-09-19 08:03:22. The transaction has 2164833 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1474272202 Timestamp [UTC]: 2016-09-19 08:03:22 Age [y:d:h:m:s]: 08:089:23:34:12
Block: 1139184 Fee (per_kB): 0.100000000000 (0.137634408602) Tx size: 0.7266 kB
Tx version: 1 No of confirmations: 2164833 RingCT/type: no
Extra: 01c0a528b04356920f497bfab95aa0b5f3ac4adadbffdf137304a7797e899894c6de2074bf265eca8b8ad7bbe4afdc453c880b4412c96fd3fbc0c278b2854a833a2dd0

5 output(s) for total of 0.809000000000 xmr

stealth address amount amount idx tag
00: 7b3d965afab5f6ad74021cfbae3ad77c92081e47a7fbd02a5b1deacf15515b8e 0.002000000000 60961 of 95916 -
01: 8745390ad057b1def2325c16ba7bc568ec765daaf3976cdea6836f6bbb56d8d6 0.007000000000 213898 of 247341 -
02: 3833329c465684be04c237df2d47db434d12d0e9b8b2c3b6c23eb708ceff432a 0.010000000000 458460 of 502466 -
03: 2fedd015c716efd0b960d271a0b6e775fbc30f5dab3df81ca545ba3f342ef4ee 0.090000000000 256832 of 317822 -
04: d2bac5018fc9f98914917b519a5fdc562992c33a5fc61698d2b0fb1ab5b4b339 0.700000000000 471604 of 514467 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-26 12:19:02 till 2016-09-19 07:10:05; resolution: 4.98 days)

  • |_*____*__________________________________________________________________________________________________________________________________________________________________*|
  • |____________________________________________________________________*_______________________*____________________________________________________________________________*|

2 inputs(s) for total of 0.909000000000 xmr

key image 00: 639fec0f33ed06159c10c946f736c2cd187ceb1dbf86988cffbe0cead080b80e amount: 0.009000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: cdc49f6e98b86030c7445fdc53a48bd26be5be52f98c92956cecdd9c3a4cc0fd 00057377 1 3/156 2014-05-26 13:19:02 10:206:18:18:32
- 01: 0a108b1da482d19126cd7675f0aac2605d9453f44f6b028430068bb3700aa440 00096198 1 8/137 2014-06-22 05:35:51 10:180:02:01:43
- 02: 4ee256135e0c1062dc43645a499835c96812b725243dd72022b3ab22a987be2e 01139135 3 1/23 2016-09-19 06:10:05 08:090:01:27:29
key image 01: dff00909d8b43e289400822956a5e2a966a2becf59e2ef00f451ab2a19387019 amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c592f2dc55885e269667b0bee3e2fee4a4dfbb517ac1255353b8838a63423534 00544796 1 9/57 2015-05-01 12:59:54 09:231:18:37:40
- 01: 93b65db3c4603abb32bfb242491deb048be18162506f01998b66b3c20f69c3f0 00713574 0 0/4 2015-08-27 15:10:02 09:113:16:27:32
- 02: 319bb99506d0c3d3747882c423987880e18364bc37529cb010491c1a13308317 01139070 3 4/21 2016-09-19 03:41:39 08:090:03:55:55
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 9000000000, "key_offsets": [ 15722, 123302, 63095 ], "k_image": "639fec0f33ed06159c10c946f736c2cd187ceb1dbf86988cffbe0cead080b80e" } }, { "key": { "amount": 900000000000, "key_offsets": [ 239641, 44921, 114717 ], "k_image": "dff00909d8b43e289400822956a5e2a966a2becf59e2ef00f451ab2a19387019" } } ], "vout": [ { "amount": 2000000000, "target": { "key": "7b3d965afab5f6ad74021cfbae3ad77c92081e47a7fbd02a5b1deacf15515b8e" } }, { "amount": 7000000000, "target": { "key": "8745390ad057b1def2325c16ba7bc568ec765daaf3976cdea6836f6bbb56d8d6" } }, { "amount": 10000000000, "target": { "key": "3833329c465684be04c237df2d47db434d12d0e9b8b2c3b6c23eb708ceff432a" } }, { "amount": 90000000000, "target": { "key": "2fedd015c716efd0b960d271a0b6e775fbc30f5dab3df81ca545ba3f342ef4ee" } }, { "amount": 700000000000, "target": { "key": "d2bac5018fc9f98914917b519a5fdc562992c33a5fc61698d2b0fb1ab5b4b339" } } ], "extra": [ 1, 192, 165, 40, 176, 67, 86, 146, 15, 73, 123, 250, 185, 90, 160, 181, 243, 172, 74, 218, 219, 255, 223, 19, 115, 4, 167, 121, 126, 137, 152, 148, 198, 222, 32, 116, 191, 38, 94, 202, 139, 138, 215, 187, 228, 175, 220, 69, 60, 136, 11, 68, 18, 201, 111, 211, 251, 192, 194, 120, 178, 133, 74, 131, 58, 45, 208 ], "signatures": [ "b66337d7dc1a552003b61e96651510bf53ae4a8e7f08624da079386b1056c501c682d743640de16896ff8aba143589a5725c91307327eaf5b276bcab930a170b9a32e63043c28c645b4242c0869112689a4206889442ed4826c5e87532759a015c4abc950831b667cce7c2b2f035b73aeb473cde87c1d542f078345d795c3309bfd58b28aac2b8829932cf7806232d4506b16e3caac3a99891c1deb8d5ba56019bfa80749ab927455c87fd0bb88b9211c95de4157bda6421b17f786ed3c30b07", "47761dd01bceada0d69456cda7e1827600ff0857bda26259e1b595328c372a07f79c6809540f824fd694791383d58d17cc820ceaf559552ee96c94242d46db0ad6d50bae2594dc327f9a95d3b2848afdf089ee614c55edf527d0de2b982a040a004ac88b667d6bd8eb76a1133079457f19a41cb7c777e4e461eb3ea806de620e7d77523ae369065595305207252d99f5a1743ea4a027eb365973494f2323a30402590fbc9d6b3e49488aeed3a9e0ec9251893b4f7a6ff48cd7d87fc694ee7807"] }


Less details
source code | moneroexplorer