Monero Transaction 38d970aaf5361db2a2563a802b6cf197871ba83c0ac9df197be1aaf670023b04

Autorefresh is OFF

Tx hash: e45bbae826760c3b42ecc838a4ba5ad1cd2094f8543d57ee25dfe7040cde0cd1

Tx prefix hash: d1318ca9ad95d4023dd15140835a74ae29fbf3fecdb44209d2d8019ba0351534
Tx public key: 0db418ac5ddd39910506dc772866aac8bfe672ea6213fe3a929d4f4469279d65
Payment id (encrypted): b3af4caadf2e3e05

Transaction e45bbae826760c3b42ecc838a4ba5ad1cd2094f8543d57ee25dfe7040cde0cd1 was carried out on the Monero network on N/A. The transaction has 0 confirmations. Total output fee is 0.000030640000 XMR.

Timestamp: 0 Timestamp [UTC]: N/A Age [y:d:h:m:s]:
Block: N/A Fee (per_kB): 0.000030640000 (0.000111656085) Tx size: 0.2744 kB
Tx version: 2 No of confirmations: 0 RingCT/type: yes/6
Extra: 010db418ac5ddd39910506dc772866aac8bfe672ea6213fe3a929d4f4469279d65020901b3af4caadf2e3e05

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: 0c1a8d1603992e49757caf91889a13b4f60ede37ef60bcef42447025fb43809d ? N/A of 120204536 <c8>
01: c08544ec8efa93c29ebabcfda5c1bdedd46bc6ea0e66379b21a6923494f2109f ? N/A of 120204536 <e7>

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2024-06-24 16:40:30 till 2024-11-14 22:15:01; resolution: 0.84 days)

  • |_*________________________________________________________________________________*________________________________________*__________________________________*______*__**|

1 input(s) for total of ? xmr

key image 00: f60c132afbd7ae50bcca43b5ae1b5f1dff445b4bc82c076cd0f0b55c18e6c6d3 amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 129682818810e67db1d32bce77fa0d304b1db4be51183be8fd86537c8ba94a20 03178518 16 2/4 2024-06-24 17:40:30 00:154:07:45:27
- 01: c091c92536700ba1658f0f715f1b1faa4447dcf41cc1808a174a19ff9c958803 03227934 16 1/2 2024-09-01 12:05:04 00:085:13:20:53
- 02: b3bd7710e0167ba1190456c6196fbc83f493d69798172ea3e52eaff69a8815f6 03253061 16 1/2 2024-10-06 10:53:09 00:050:14:32:52
- 03: 85baba49509640eec29de29ac4627e64244b09f9a77f512a49afdd0e62ce38fd 03274372 16 1/16 2024-11-04 23:48:18 00:021:01:37:43
- 04: bdc4041e9ae783cbd4d805e9bb3adf05a12c497cdf9f2d687206e4a10ca954b6 03278528 16 2/2 2024-11-10 19:03:42 00:015:06:22:19
- 05: de113c5271c773079fd430a366e14408acb0271399180439c6b920c614e833ff 03280553 16 3/2 2024-11-13 15:27:16 00:012:09:58:45
- 06: 98c0cbb95979db7727e2470e2583c9fea265ecc177cfbe11332199009afea7ef 03280981 16 1/2 2024-11-14 06:11:00 00:011:19:15:01
- 07: 1f209e8953a3da4fdaf8c6b8fa4af9c12392140ea9868f590e1f4ddc16d62d6c 03281169 16 3/2 2024-11-14 11:48:58 00:011:13:37:03
- 08: 1e77866ed87b213a6d6960c4bd589291741c52b91f242c18460732bea8700701 03281316 16 2/2 2024-11-14 16:23:49 00:011:09:02:12
- 09: 45604f7338d6360d48460173a0f020d845f85021d19891d11559df9080058146 03281371 16 2/15 2024-11-14 18:01:22 00:011:07:24:39
- 10: 52fd13dd40640224a6bf9dbcd2604a78a2025fc61ea44bf6842cbd1628d086dc 03281461 16 1/2 2024-11-14 20:51:53 00:011:04:34:08
- 11: e15c752b230a053ecbc40e8bd7a1bceb91f8bb64a2a5168266ae0875c71b8c6d 03281465 16 2/2 2024-11-14 21:04:00 00:011:04:22:01
- 12: 7d4cb013a6bf5703e3270a91e0dd7daebf56468db4ce96af1a9dd81ad498f8ee 03281466 16 3/2 2024-11-14 21:04:21 00:011:04:21:40
- 13: 01ebfe8108f0adccb89701af8fb08782834ada5b6398460687e96605b94a7b23 03281466 16 4/2 2024-11-14 21:04:21 00:011:04:21:40
- 14: b7508cc82d6ec0bd7c28cb84b4420089143d897ff7b508ed79df956d0013e626 03281470 16 2/16 2024-11-14 21:14:26 00:011:04:11:35
- 15: cf43c4359c27ceb96bd5cf1bdf3eda364cc65c5f91e2339cbf82cf376b0a57b0 03281471 16 1/2 2024-11-14 21:15:01 00:011:04:11:00
{ "version": 2, "unlock_time": 0, "vin": [ { "key": { "amount": 0, "key_offsets": [ 107600448, 6038185, 2910492, 1958364, 572184, 226500, 47384, 18036, 17215, 5979, 10321, 687, 288, 28, 409, 86 ], "k_image": "f60c132afbd7ae50bcca43b5ae1b5f1dff445b4bc82c076cd0f0b55c18e6c6d3" } } ], "vout": [ { "amount": 0, "target": { "tagged_key": { "key": "0c1a8d1603992e49757caf91889a13b4f60ede37ef60bcef42447025fb43809d", "view_tag": "c8" } } }, { "amount": 0, "target": { "tagged_key": { "key": "c08544ec8efa93c29ebabcfda5c1bdedd46bc6ea0e66379b21a6923494f2109f", "view_tag": "e7" } } } ], "extra": [ 1, 13, 180, 24, 172, 93, 221, 57, 145, 5, 6, 220, 119, 40, 102, 170, 200, 191, 230, 114, 234, 98, 19, 254, 58, 146, 157, 79, 68, 105, 39, 157, 101, 2, 9, 1, 179, 175, 76, 170, 223, 46, 62, 5 ], "rct_signatures": { "type": 6, "txnFee": 30640000, "ecdhInfo": [ { "trunc_amount": "3218a0b101575c68" }, { "trunc_amount": "51462d6c2591bfd3" }], "outPk": [ "889c902442b7fa1386571b7ce3c9d3f7fca14c05e97a5318a4e66fcca58a2ab7", "ff28801c305427ddf40dbc07a88778d63b2df7086b32cef551b56e56e36cfe90"] } }


Less details
source code | moneroexplorer