Monero Transaction 452527078b3ed89cc142e095cd4d37ef3104963e0a9b63f51487316454f8b9c2

Autorefresh is OFF

Tx hash: 452527078b3ed89cc142e095cd4d37ef3104963e0a9b63f51487316454f8b9c2

Tx prefix hash: acffbaafbf3960983bc3807cbef4b32928ba9f95a5a027179c408746b28ccbb5
Tx public key: 8ac4c664933cddf0282fcb4918a78bacad142d06cee95ba62916b777f5decee8

Transaction 452527078b3ed89cc142e095cd4d37ef3104963e0a9b63f51487316454f8b9c2 was carried out on the Monero network on 2015-01-20 22:45:52. The transaction has 2902617 confirmations. Total output fee is 0.012700000000 XMR.

Timestamp: 1421793952 Timestamp [UTC]: 2015-01-20 22:45:52 Age [y:d:h:m:s]: 09:331:08:20:51
Block: 400712 Fee (per_kB): 0.012700000000 (0.035435422343) Tx size: 0.3584 kB
Tx version: 1 No of confirmations: 2902617 RingCT/type: no
Extra: 018ac4c664933cddf0282fcb4918a78bacad142d06cee95ba62916b777f5decee8

3 output(s) for total of 3.990000000000 xmr

stealth address amount amount idx tag
00: 016691e8bd82584adb04e53c68520c2fae313bcc963da1ccfccef5c91cc9b4b9 0.090000000000 132647 of 317822 -
01: ffbb8c4af11ffc8a98047b55d3bc3e98cd6e03d95f6ef4474da8c29b63492ab5 0.900000000000 191874 of 454894 -
02: 1278f42b0c9a90440deeee327abe15f0b52da8e16b34240709ec1ebad0af8b36 3.000000000000 170229 of 300495 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-15 14:49:30 till 2015-01-16 19:07:38; resolution: 1.27 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 4.002700000000 xmr

key image 00: d55cc0404545100ce7d353bbb30d363b159bb40fec04f4b77d9d60cf37892baf amount: 0.002700000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c2f9bfbd8bba38c96f1d9c972f4cb82f1b880b929242efa0b9bfb9e3db1dabac 00086626 1 46/5 2014-06-15 15:49:30 10:185:15:17:13
key image 01: 00f28e9c7e1eb9b7f96bf810d8f8e13221a4c3fd6124ee46173c0c5c5418896d amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a1f22a66ad25ccfd82e21a66411844781cc5f98ac2f277ba37fd0806c6fbabfc 00394757 4 11/5 2015-01-16 18:07:38 09:335:12:59:05
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 2700000000, "key_offsets": [ 347 ], "k_image": "d55cc0404545100ce7d353bbb30d363b159bb40fec04f4b77d9d60cf37892baf" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 142840 ], "k_image": "00f28e9c7e1eb9b7f96bf810d8f8e13221a4c3fd6124ee46173c0c5c5418896d" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "016691e8bd82584adb04e53c68520c2fae313bcc963da1ccfccef5c91cc9b4b9" } }, { "amount": 900000000000, "target": { "key": "ffbb8c4af11ffc8a98047b55d3bc3e98cd6e03d95f6ef4474da8c29b63492ab5" } }, { "amount": 3000000000000, "target": { "key": "1278f42b0c9a90440deeee327abe15f0b52da8e16b34240709ec1ebad0af8b36" } } ], "extra": [ 1, 138, 196, 198, 100, 147, 60, 221, 240, 40, 47, 203, 73, 24, 167, 139, 172, 173, 20, 45, 6, 206, 233, 91, 166, 41, 22, 183, 119, 245, 222, 206, 232 ], "signatures": [ "ca88c26a2215e59e778f8c871b8829dd96f93a2441c0992847ba4b3d732334067d11edcfe146e0dd114257b1b410a8155865c72ecd876796fc87f599c36ede08", "ac89bfc9dcb09210ce092f27378857538cb6d88a13818abdf216344f7f27130abe8283a8e4dac9c0c7302b43eaf8f23534fbef5e0d6830166d8dee8b48088f01"] }


Less details
source code | moneroexplorer