Monero Transaction 4485b45c232821dd3713da5d0374d5cfb40a8ecacb792cca4005dd41aa3ae5ff

Autorefresh is OFF

Tx hash: 4485b45c232821dd3713da5d0374d5cfb40a8ecacb792cca4005dd41aa3ae5ff

Tx prefix hash: e64d2176cb18224cfce81f352a990ab306caa4d11f88e377abc696f1e4a78232
Tx public key: 7032a6ac9f1c91acd4211794ec167bbcfd435bb31790e5ebef7708a59339ae12
Payment id: f430ecfdfcff63ea905f0c9c1033ef4092ed674ff44a8f6fcd9d8464a8a78cc9

Transaction 4485b45c232821dd3713da5d0374d5cfb40a8ecacb792cca4005dd41aa3ae5ff was carried out on the Monero network on 2014-07-29 18:25:59. The transaction has 3128368 confirmations. Total output fee is 0.006311174269 XMR.

Timestamp: 1406658359 Timestamp [UTC]: 2014-07-29 18:25:59 Age [y:d:h:m:s]: 10:107:07:48:35
Block: 150363 Fee (per_kB): 0.006311174269 (0.010953631274) Tx size: 0.5762 kB
Tx version: 1 No of confirmations: 3128368 RingCT/type: no
Extra: 022100f430ecfdfcff63ea905f0c9c1033ef4092ed674ff44a8f6fcd9d8464a8a78cc9017032a6ac9f1c91acd4211794ec167bbcfd435bb31790e5ebef7708a59339ae12

5 output(s) for total of 6.493688825731 xmr

stealth address amount amount idx tag
00: 26ec85f1044674fbb450a4a5ca95a6f346c0eda32b5a68a388f67acb39761424 0.003688825731 0 of 1 -
01: 7d9db227bc9f145875aaa7303fca0895c9385d4aa8d580adef5f0e302a291042 0.090000000000 92954 of 317822 -
02: 9677d81ea4e0e2d3c1e6c4ca9a23e6ad1e734c190cb68cbd591476b3c6c35dfd 0.200000000000 281479 of 1272210 -
03: 5d40794b3a3685530823838811788c2b1469087713f21ab64bce1a5df88e1ade 0.200000000000 281480 of 1272210 -
04: 50173158e73cbc40ad94b8da3a25554f1c973a3a174768efe148fcefff566ab6 6.000000000000 72350 of 207703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-27 04:54:36 till 2014-07-29 17:33:23; resolution: 0.01 days)

  • |___*______________________________________________________________________________________________________________________________________________________________________|
  • |_______________________________________________________________________________________________________________________________________________________________________*__|
  • |_________________________________________________________________________________________________________________*________________________________________________________|

3 inputs(s) for total of 6.500000000000 xmr

key image 00: b6ec00ca2998405d6baef983860dd880497650144048727e378f0ec2ddcfc540 amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 931f4610890f1bc55fc766e99a21de86c4cb901fc57eae11b7604b5a73c294a7 00146725 1 1/7 2014-07-27 05:54:36 10:109:20:19:58
key image 01: acb2aa1e312028d12f5f0093b528ac760547e5747f9710b787136ef569025055 amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a3984c39650f7741e20fa165b90218edf57dca6424afadf7863455bc3364501e 00150266 1 1/8 2014-07-29 16:33:23 10:107:09:41:11
key image 02: 37ac8c939b82206ad59f3ebb42ea60c7343140c8eadb51206924ca760b076de8 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 65dfb59655a8600ee1df6b27fa5027a1c0e6203d753a2b5affaacab554bc2594 00149085 1 1/7 2014-07-28 21:20:31 10:108:04:54:03
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000000, "key_offsets": [ 74165 ], "k_image": "b6ec00ca2998405d6baef983860dd880497650144048727e378f0ec2ddcfc540" } }, { "key": { "amount": 1000000000000, "key_offsets": [ 147207 ], "k_image": "acb2aa1e312028d12f5f0093b528ac760547e5747f9710b787136ef569025055" } }, { "key": { "amount": 500000000000, "key_offsets": [ 172592 ], "k_image": "37ac8c939b82206ad59f3ebb42ea60c7343140c8eadb51206924ca760b076de8" } } ], "vout": [ { "amount": 3688825731, "target": { "key": "26ec85f1044674fbb450a4a5ca95a6f346c0eda32b5a68a388f67acb39761424" } }, { "amount": 90000000000, "target": { "key": "7d9db227bc9f145875aaa7303fca0895c9385d4aa8d580adef5f0e302a291042" } }, { "amount": 200000000000, "target": { "key": "9677d81ea4e0e2d3c1e6c4ca9a23e6ad1e734c190cb68cbd591476b3c6c35dfd" } }, { "amount": 200000000000, "target": { "key": "5d40794b3a3685530823838811788c2b1469087713f21ab64bce1a5df88e1ade" } }, { "amount": 6000000000000, "target": { "key": "50173158e73cbc40ad94b8da3a25554f1c973a3a174768efe148fcefff566ab6" } } ], "extra": [ 2, 33, 0, 244, 48, 236, 253, 252, 255, 99, 234, 144, 95, 12, 156, 16, 51, 239, 64, 146, 237, 103, 79, 244, 74, 143, 111, 205, 157, 132, 100, 168, 167, 140, 201, 1, 112, 50, 166, 172, 159, 28, 145, 172, 212, 33, 23, 148, 236, 22, 123, 188, 253, 67, 91, 179, 23, 144, 229, 235, 239, 119, 8, 165, 147, 57, 174, 18 ], "signatures": [ "eb7de0c1801ab928749867064117394343adc29058d9c75cb85ad577df54a200b3fb33903a77107969e2e5326b6c5fbd660ab3510962f9438edb0c1927de9107", "206ef494c82c3e5a0f7f688e3cbe56aa981385796a211566634a0f3042735a0e0ddbbf7789cec752f41fc210b53d42c2e8113c921615737ffea765fd2400400b", "3006511292fd2f2a33bc3cb1214da694cdf2da0ef7e8fddbb69ead9fd8717a0cb05f8ca8c0ff704676998d1eb56a2fda7b8619bf09de40166d337b88ed22180e"] }


Less details
source code | moneroexplorer