Monero Transaction 45a3053311afe3002fb56c45158f2ea91fd9f39c83a52e2ab59ba5e759e6e6c4

Autorefresh is OFF

Tx hash: 45a3053311afe3002fb56c45158f2ea91fd9f39c83a52e2ab59ba5e759e6e6c4

Tx prefix hash: 2e845a6f423255c0626de7df80a2b58e370891b01e37db1ef315d947a0913acc
Tx public key: 2316dbe4c0e0486736d3f58b61541d1c180624914c7d8b88ddd1b68f92fc635f

Transaction 45a3053311afe3002fb56c45158f2ea91fd9f39c83a52e2ab59ba5e759e6e6c4 was carried out on the Monero network on 2014-07-25 17:17:34. The transaction has 3133732 confirmations. Total output fee is 0.005186040750 XMR.

Timestamp: 1406308654 Timestamp [UTC]: 2014-07-25 17:17:34 Age [y:d:h:m:s]: 10:110:18:41:02
Block: 144578 Fee (per_kB): 0.005186040750 (0.005537545076) Tx size: 0.9365 kB
Tx version: 1 No of confirmations: 3133732 RingCT/type: no
Extra: 012316dbe4c0e0486736d3f58b61541d1c180624914c7d8b88ddd1b68f92fc635f

10 output(s) for total of 4.258000000000 xmr

stealth address amount amount idx tag
00: 8d369a7fcacd6e708f838328931f1481230e26d4a7cac9b65553a22140b11271 0.008000000000 158079 of 245068 -
01: e44d188187d54f32b02a757461cbde44e10dc83c876480ee30dc2d0dac5c9896 0.050000000000 108957 of 284521 -
02: 657d316e73e3fb19018a4af4cba72a62efbdb543be065fe9456babdb67e23338 0.100000000000 319460 of 982315 -
03: ec7ea578465e5a2d89808cd2b9763da3a766a9393675ddbde953d262f07dbf37 0.100000000000 319461 of 982315 -
04: f4585b4abb7354d1bb36829a42bd568359a41ec685f0955185fe737ef69825c7 0.100000000000 319462 of 982315 -
05: 81195aa873d828b3765f33f59e106c35f9b3edf3fbb59db5a741e687831ab4e0 0.100000000000 319463 of 982315 -
06: ac30c665ad301e538aff5c56090ebcb4f6661782e1e2c140baa8d12ff7b70ca5 0.400000000000 113527 of 688584 -
07: d9adf39affc567dcddc96324f7b7c0238ab9395a077c9251c961bb210981c9e9 0.400000000000 113528 of 688584 -
08: e41f999e3c4306daffe3f774cb04e3f9422bddbcf56ce25d1ec0eb9b231a8343 1.000000000000 134379 of 874629 -
09: 0fe2798301937321056e3411a512b7d083a2e53e961d6d0d69c31c05f41e41e1 2.000000000000 53648 of 434057 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-21 18:13:24 till 2014-07-25 18:06:53; resolution: 0.02 days)

  • |__*_______________________________________________________________________________________________________________________________________________________________________|
  • |________________________________________________________________________________________________________________________________________________________________*_________|
  • |________________________________________________________________________________________________________________________________________________________________________*_|
  • |_______________________________________________________________________________________________________________________________________________________________________*__|
  • |____________________________________________________________________________________________________________________________________________________________________*_____|

5 inputs(s) for total of 4.263186040750 xmr

key image 00: fd594cee246ad35002ceedb7eab50c3d5387ad51aac7269bec7afd88c67baa72 amount: 0.003186040750
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 2628a82b5c375be2c3fc1d586499de3266cfe71d29584543acfd058f448ee619 00138830 0 0/5 2014-07-21 19:13:24 10:114:16:45:12
key image 01: 5f7f0645a10075b88b152baa15003e9099591b4e25245b51e8279d30dc4e30ec amount: 0.060000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9098b25ead7b9e255d1299d84fef98d196c6d2f62f19f072a2ad3297a2c52fab 00144288 0 0/5 2014-07-25 13:00:10 10:110:22:58:26
key image 02: 35ea6d31c744d45677f0ff23b8a47a2a16e7c15da30292a008d5094be6266f3f amount: 0.700000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 208a89ab8a8b1712f366e46b624a0ac52852c1fac2396e77054b1cad4ec00aa7 00144555 1 6/10 2014-07-25 17:06:53 10:110:18:51:43
key image 03: 362e5385cb6a2dea297b1e61ba6042ca9ad42a1047659ba73ffd812a47a3dd96 amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3da0474eef190ba117b30cbfb558a4f35b41267db1f65769dc0cae69be911c46 00144519 1 10/11 2014-07-25 16:28:45 10:110:19:29:51
key image 04: e52f84105663ae1358364eab1c9098730bde29624c76d253e45ba898f8b9a079 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: da7827826e3065798456b0a8542a82cef79d86e39a09b60184b54a72ec38e1c4 00144430 1 2/10 2014-07-25 15:03:27 10:110:20:55:09
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 3186040750, "key_offsets": [ 0 ], "k_image": "fd594cee246ad35002ceedb7eab50c3d5387ad51aac7269bec7afd88c67baa72" } }, { "key": { "amount": 60000000000, "key_offsets": [ 95692 ], "k_image": "5f7f0645a10075b88b152baa15003e9099591b4e25245b51e8279d30dc4e30ec" } }, { "key": { "amount": 700000000000, "key_offsets": [ 80917 ], "k_image": "35ea6d31c744d45677f0ff23b8a47a2a16e7c15da30292a008d5094be6266f3f" } }, { "key": { "amount": 3000000000000, "key_offsets": [ 34293 ], "k_image": "362e5385cb6a2dea297b1e61ba6042ca9ad42a1047659ba73ffd812a47a3dd96" } }, { "key": { "amount": 500000000000, "key_offsets": [ 161237 ], "k_image": "e52f84105663ae1358364eab1c9098730bde29624c76d253e45ba898f8b9a079" } } ], "vout": [ { "amount": 8000000000, "target": { "key": "8d369a7fcacd6e708f838328931f1481230e26d4a7cac9b65553a22140b11271" } }, { "amount": 50000000000, "target": { "key": "e44d188187d54f32b02a757461cbde44e10dc83c876480ee30dc2d0dac5c9896" } }, { "amount": 100000000000, "target": { "key": "657d316e73e3fb19018a4af4cba72a62efbdb543be065fe9456babdb67e23338" } }, { "amount": 100000000000, "target": { "key": "ec7ea578465e5a2d89808cd2b9763da3a766a9393675ddbde953d262f07dbf37" } }, { "amount": 100000000000, "target": { "key": "f4585b4abb7354d1bb36829a42bd568359a41ec685f0955185fe737ef69825c7" } }, { "amount": 100000000000, "target": { "key": "81195aa873d828b3765f33f59e106c35f9b3edf3fbb59db5a741e687831ab4e0" } }, { "amount": 400000000000, "target": { "key": "ac30c665ad301e538aff5c56090ebcb4f6661782e1e2c140baa8d12ff7b70ca5" } }, { "amount": 400000000000, "target": { "key": "d9adf39affc567dcddc96324f7b7c0238ab9395a077c9251c961bb210981c9e9" } }, { "amount": 1000000000000, "target": { "key": "e41f999e3c4306daffe3f774cb04e3f9422bddbcf56ce25d1ec0eb9b231a8343" } }, { "amount": 2000000000000, "target": { "key": "0fe2798301937321056e3411a512b7d083a2e53e961d6d0d69c31c05f41e41e1" } } ], "extra": [ 1, 35, 22, 219, 228, 192, 224, 72, 103, 54, 211, 245, 139, 97, 84, 29, 28, 24, 6, 36, 145, 76, 125, 139, 136, 221, 209, 182, 143, 146, 252, 99, 95 ], "signatures": [ "ef9e8fa21e726147ab4d8647f93cd83b24d9bc189796b1bbcae56c25d41e850bf1ead18a1ad1197ac3eccf739d3bd80923429fc3853544a293c489e26015640b", "d37ec5e2255633c58f4244272e8ed5a95293bf6eb0611e5af08929ac5acce300af6b41ba0cd88d0bc244480f2560488736724848229a70bed4b635fce4bf3d0e", "d415bc793e9a1539c13f145f6608409cae8fb994e62007814e3083f7aadc140c77553ec4e578ca885799b927bd3b26d92042bb1556c956a856f6d559ce7bf507", "fed1f22d6927854b2fa787ce2ff589870e16f3e98bfbb70882039e75163fe70a2bf1af328b9c562a5c5442e38390444f06839a71e394f35a72089707999e7207", "67b12c6addac1cd719e8636fad31515eeb7584d3d918f71baa03b01b64bfa70880d0c2f5ce7fb1f58e61b2dca5dad38d8c249baa80ad3da46f764711af8e3a0e"] }


Less details
source code | moneroexplorer