Monero Transaction 4345c23d2dcc6d586b295abab843ef04f6fb59afca7c8d9aa6970581204fdc0d

Autorefresh is OFF

Tx hash: 4345c23d2dcc6d586b295abab843ef04f6fb59afca7c8d9aa6970581204fdc0d

Tx prefix hash: a29558314d5dbaf2cb72f78fc447a607cb635f58261525e83da1ce3a72e28653
Tx public key: 952d046e3e112386268180185c2b25d161c9c2d28d099ad753ec8eb380dc219f
Payment id: f44406d3bb9714457a574c2fe25444fef3c27b22b39b52b1aca2ef18531aaba4

Transaction 4345c23d2dcc6d586b295abab843ef04f6fb59afca7c8d9aa6970581204fdc0d was carried out on the Monero network on 2014-07-16 17:25:44. The transaction has 3146783 confirmations. Total output fee is 0.005644727100 XMR.

Timestamp: 1405531544 Timestamp [UTC]: 2014-07-16 17:25:44 Age [y:d:h:m:s]: 10:119:17:04:04
Block: 131481 Fee (per_kB): 0.005644727100 (0.005797593330) Tx size: 0.9736 kB
Tx version: 1 No of confirmations: 3146783 RingCT/type: no
Extra: 022100f44406d3bb9714457a574c2fe25444fef3c27b22b39b52b1aca2ef18531aaba401952d046e3e112386268180185c2b25d161c9c2d28d099ad753ec8eb380dc219f

10 output(s) for total of 100.399355272900 xmr

stealth address amount amount idx tag
00: 255e16b73ed7cc8ac4a09cef3fea69cbda41568c093ee2d4a028c65ed1a8f21c 0.000355272900 0 of 1 -
01: 4bc3eff17995fcf71e9cc3e7049f094af6d13781e63ad48ab418d90a0273b04c 0.009000000000 149573 of 233398 -
02: e39b5eb99d0dc6ddaae2bb404f005034d6bae1d5677cab769458c1b66a77001c 0.010000000000 313864 of 502466 -
03: 20776cf529bd4991441c797edc269fa096efcc2dbb5bb48073e70874e02531e7 0.080000000000 78430 of 269576 -
04: ecd0844c79319d98f71311595ca288f5213d86b265b68ab86f5f05c00f1f7854 0.600000000000 89343 of 650760 -
05: 159f8fb96cf10a5eb536a272bb11e3490a465088106a595fa7fa93a4ecbd6405 0.700000000000 68614 of 514466 -
06: 5e830ac0a64e8f8a1d70ebefaaf01018ccd72ae2f63a19566066ec2492f52259 4.000000000000 23617 of 237197 -
07: 42491d9125a1648a88f30dbdf2c0752e6848043eb2e7bb0d830c1672cb875321 5.000000000000 55731 of 255089 -
08: ca2fbedfee307fe2e47806289b4f7d9dee97ca8db1d9ee6c239f3f7a8b8aecd5 20.000000000000 6018 of 78991 -
09: 8f79c1e76b156adff5c6e969992d554e6d0749ffce95d947a89a58c98c409e33 70.000000000000 1036 of 24819 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-23 18:27:40 till 2014-07-16 17:55:54; resolution: 0.14 days)

  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_____________________________________________________________________*____________________________________________________________________________________________________|
  • |____________________________________________________________________________________________________________________________________________________*_____________________|
  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_______________________________________________________________________________________________________________________________________________________________________*__|

5 inputs(s) for total of 100.405000000000 xmr

key image 00: e72df9c45fbfc43bd9e5929d8feb0b2f9d36d5c3f56227284c245bf1796e6491 amount: 0.005000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 2a91b26b611224ec13f88b9d1daa9a45312db691e4b0c5c6f46a7b180bd095cc 00131449 1 1/11 2014-07-16 16:55:54 10:119:17:33:54
key image 01: 393934707a76c096ebfa6995cf058495915013d0ff7ad1b6879282510cee6b33 amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 242781f6d720ce3f3bdfe791e6e29433d56dde4e524a48b40c71336119104c78 00111939 1 9/10 2014-07-03 03:26:18 10:133:07:03:30
key image 02: 439fefebb24977bcfe263824756f47b4e183f9273b79c937cb9fffa593266773 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ffd0b974f86b5c7ffbbbe874c33be607d772702f23126ca1501228b1c946dff4 00127342 1 6/9 2014-07-13 20:58:13 10:122:13:31:35
key image 03: eb2f1ef540449bf1809e7191188e3a11dac46e7e0a3521b864de265cd68160d6 amount: 9.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4dfd05a2409b5c7d2662bd4619cdfd91118791d8002894ae5a9e9ee833e97d19 00098539 1 3/7 2014-06-23 19:27:40 10:142:15:02:08
key image 04: 5344e4a5c74afe8c231ea15b9d3f1a9bf5e452cb9cca562ac184f9907fc86760 amount: 90.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: afce2ac07693458346fa106c92fdd83f30bd6f826249c00c7ce033299e1238cc 00130930 1 22/3 2014-07-16 08:30:19 10:120:01:59:29
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000, "key_offsets": [ 189066 ], "k_image": "e72df9c45fbfc43bd9e5929d8feb0b2f9d36d5c3f56227284c245bf1796e6491" } }, { "key": { "amount": 900000000000, "key_offsets": [ 42555 ], "k_image": "393934707a76c096ebfa6995cf058495915013d0ff7ad1b6879282510cee6b33" } }, { "key": { "amount": 500000000000, "key_offsets": [ 119860 ], "k_image": "439fefebb24977bcfe263824756f47b4e183f9273b79c937cb9fffa593266773" } }, { "key": { "amount": 9000000000000, "key_offsets": [ 7465 ], "k_image": "eb2f1ef540449bf1809e7191188e3a11dac46e7e0a3521b864de265cd68160d6" } }, { "key": { "amount": 90000000000000, "key_offsets": [ 1996 ], "k_image": "5344e4a5c74afe8c231ea15b9d3f1a9bf5e452cb9cca562ac184f9907fc86760" } } ], "vout": [ { "amount": 355272900, "target": { "key": "255e16b73ed7cc8ac4a09cef3fea69cbda41568c093ee2d4a028c65ed1a8f21c" } }, { "amount": 9000000000, "target": { "key": "4bc3eff17995fcf71e9cc3e7049f094af6d13781e63ad48ab418d90a0273b04c" } }, { "amount": 10000000000, "target": { "key": "e39b5eb99d0dc6ddaae2bb404f005034d6bae1d5677cab769458c1b66a77001c" } }, { "amount": 80000000000, "target": { "key": "20776cf529bd4991441c797edc269fa096efcc2dbb5bb48073e70874e02531e7" } }, { "amount": 600000000000, "target": { "key": "ecd0844c79319d98f71311595ca288f5213d86b265b68ab86f5f05c00f1f7854" } }, { "amount": 700000000000, "target": { "key": "159f8fb96cf10a5eb536a272bb11e3490a465088106a595fa7fa93a4ecbd6405" } }, { "amount": 4000000000000, "target": { "key": "5e830ac0a64e8f8a1d70ebefaaf01018ccd72ae2f63a19566066ec2492f52259" } }, { "amount": 5000000000000, "target": { "key": "42491d9125a1648a88f30dbdf2c0752e6848043eb2e7bb0d830c1672cb875321" } }, { "amount": 20000000000000, "target": { "key": "ca2fbedfee307fe2e47806289b4f7d9dee97ca8db1d9ee6c239f3f7a8b8aecd5" } }, { "amount": 70000000000000, "target": { "key": "8f79c1e76b156adff5c6e969992d554e6d0749ffce95d947a89a58c98c409e33" } } ], "extra": [ 2, 33, 0, 244, 68, 6, 211, 187, 151, 20, 69, 122, 87, 76, 47, 226, 84, 68, 254, 243, 194, 123, 34, 179, 155, 82, 177, 172, 162, 239, 24, 83, 26, 171, 164, 1, 149, 45, 4, 110, 62, 17, 35, 134, 38, 129, 128, 24, 92, 43, 37, 209, 97, 201, 194, 210, 141, 9, 154, 215, 83, 236, 142, 179, 128, 220, 33, 159 ], "signatures": [ "0291ed8d89ee94311a7947a52464d83905c33a37418339e1ea9e87ebaf725d07bff7ff6e8175df5e13d29cb19af04d2dc94a59ba5b8c3171f34a00769d2cea08", "0261c5fb9766aef81f7b6f7bd6fc78ade2303ea2781945d68a18d578d5177300461caa2db475a51cc4727b3d689b76bc1917fb804f6245822895abd5139cd605", "cc1fac0c758533e2cc3da360fe146c9e31eeb3607e0816fa66f5775f42990b05ae5ba4b21d31c1e1e86f63c06a8513964a501ee266e0d7a8080da8a5c278fa00", "c97d9cb85acc3ebe767dbdb64596ddcbc1568554fe9ad57bf6fd1d5bee0139005593c9bad57e0a0c2fc0ebea34743d9b94d0d234a7f6d55a01ccfc35f989e90b", "fce106a9af44e71e5fcae8b53ccec6eb366aa90b0f043650ecca1ccd9441660d768ea1785b22623bfb7ca11b1f1b9c7df95c898c54452f6b346156428d892d0e"] }


Less details
source code | moneroexplorer