Monero Transaction 45a7e57bdb2d10b075b01b6621dbb7380fd2012b4f6b8eb57bf62d6f4e72883a

Autorefresh is OFF

Tx hash: 45a7e57bdb2d10b075b01b6621dbb7380fd2012b4f6b8eb57bf62d6f4e72883a

Tx prefix hash: f3c0f3510318a14cf08e662448aa23cad2ee20c8edc1c7988591e7fdb89529a4
Tx public key: a3e6542cf60e76cb30b74db59cccfd6d2f804d1e018e2e0f70c6d5fae8a4fe5e
Payment id: 1dbd53872a6d103e470a4926852ca6a9acff18c04a1b451495fb270e06dceba8

Transaction 45a7e57bdb2d10b075b01b6621dbb7380fd2012b4f6b8eb57bf62d6f4e72883a was carried out on the Monero network on 2016-09-09 03:53:08. The transaction has 2177106 confirmations. Total output fee is 0.020000000000 XMR.

Timestamp: 1473393188 Timestamp [UTC]: 2016-09-09 03:53:08 Age [y:d:h:m:s]: 08:107:00:21:21
Block: 1131902 Fee (per_kB): 0.020000000000 (0.027270306258) Tx size: 0.7334 kB
Tx version: 1 No of confirmations: 2177106 RingCT/type: no
Extra: 0221001dbd53872a6d103e470a4926852ca6a9acff18c04a1b451495fb270e06dceba801a3e6542cf60e76cb30b74db59cccfd6d2f804d1e018e2e0f70c6d5fae8a4fe5e

5 output(s) for total of 8.040000000000 xmr

stealth address amount amount idx tag
00: 80b906355e0c69345bc361a9601d51bf07a7ba884a52fd28a8f708182eb249eb 0.040000000000 253256 of 294095 -
01: a0e2ae3d9f03d2256a9f80907333b03df1a8e6ac4adaebd6244c25f6405c91ec 0.100000000000 914965 of 982315 -
02: f2081171e43475f2e2316a8d9dd87932db4657ff1f28ccfb55d84ced633a24aa 0.900000000000 395660 of 454894 -
03: b8ca58a3095638040a6a192bb9be0ecf6b3f43da4fd86a66323dbad035de7668 1.000000000000 792738 of 874630 -
04: 44edf67a9f5ec67295687714042cbf8a0f3c6797fca75470b532348111073682 6.000000000000 186507 of 207703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-05-10 11:41:59 till 2016-09-09 04:10:57; resolution: 2.87 days)

  • |_*____________________________*__________________________________________________________________________________________________________________________________________*|
  • |___*___________________________________________________*_________________________________________________________________________________________________________________*|

2 inputs(s) for total of 8.060000000000 xmr

key image 00: af271f357e8d26edc0cd103afba2d73a1efbffb1cf849e390e06b541c6c85aaf amount: 0.060000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: df9a84a520af71e1bd0c7c29a449fb7d1a9c5fc4cb16d101a85e1bacf05e3a93 00557619 0 0/4 2015-05-10 12:41:59 09:229:15:32:30
- 01: 1eb5b95b23fb53ef5da5d887eecae82b6cd44bd8d8deeac7082f541bbb46dafe 00680593 1 5/5 2015-08-04 12:16:41 09:143:15:57:48
- 02: c9516bec2acbfb4ac20e7a924690b7e73264e8b348bff4d2aa16483f5de0e8e0 01131886 3 4/5 2016-09-09 03:10:57 08:107:01:03:32
key image 01: e167d7d17438f58d2b519f45a878eab8870041fbabdfad1dcba000763fc2500e amount: 8.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c0e05664cb4f0e4baae03f131a9390683d2f8a3967390f044512baa777404dd1 00567418 1 84/71 2015-05-17 08:34:05 09:222:19:40:24
- 01: 0dd51fb10efdf14dd9b4fa4737ec8cc0b8dae2c896c4285fc2c913e1ee50a2f7 00782315 0 0/4 2015-10-14 23:05:33 09:072:05:08:56
- 02: 350fbff2d6bd8f28cf43373fedb5257ca5502a5ec7bc264a5ed835fab4ecec11 01131886 3 2/5 2016-09-09 03:10:57 08:107:01:03:32
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 60000000000, "key_offsets": [ 141032, 15503, 68895 ], "k_image": "af271f357e8d26edc0cd103afba2d73a1efbffb1cf849e390e06b541c6c85aaf" } }, { "key": { "amount": 8000000000000, "key_offsets": [ 39101, 89771, 74193 ], "k_image": "e167d7d17438f58d2b519f45a878eab8870041fbabdfad1dcba000763fc2500e" } } ], "vout": [ { "amount": 40000000000, "target": { "key": "80b906355e0c69345bc361a9601d51bf07a7ba884a52fd28a8f708182eb249eb" } }, { "amount": 100000000000, "target": { "key": "a0e2ae3d9f03d2256a9f80907333b03df1a8e6ac4adaebd6244c25f6405c91ec" } }, { "amount": 900000000000, "target": { "key": "f2081171e43475f2e2316a8d9dd87932db4657ff1f28ccfb55d84ced633a24aa" } }, { "amount": 1000000000000, "target": { "key": "b8ca58a3095638040a6a192bb9be0ecf6b3f43da4fd86a66323dbad035de7668" } }, { "amount": 6000000000000, "target": { "key": "44edf67a9f5ec67295687714042cbf8a0f3c6797fca75470b532348111073682" } } ], "extra": [ 2, 33, 0, 29, 189, 83, 135, 42, 109, 16, 62, 71, 10, 73, 38, 133, 44, 166, 169, 172, 255, 24, 192, 74, 27, 69, 20, 149, 251, 39, 14, 6, 220, 235, 168, 1, 163, 230, 84, 44, 246, 14, 118, 203, 48, 183, 77, 181, 156, 204, 253, 109, 47, 128, 77, 30, 1, 142, 46, 15, 112, 198, 213, 250, 232, 164, 254, 94 ], "signatures": [ "f48594afc62155316a5a5b491ec359a1538bd2c550718d2fab761bc767be830415d349559d97a7afab4b1fd413c705038dd7e539df00a10092f4e137d532d8095f8fed2cf49a4bb631ec18cde2adf71a0966f48d93781e9b40259418a85fee002db65c5738512ae5046547e47779b437e348682476a8ae706c6266a332abc6024755d3b3a7f1decf3ca08679399e864373a492522f2d95b323b143bc897e6a03550582b6eccc3713d06faea0a6d851269abc7d47e1e9b1822faf73966a853503", "ef2e5c86510a94f1cf346d15c9909d2bd1544dd084645afe9615a6ecf77d46050c3d92af433be237a3ed49931728b2a23673967f5e28c6ea261158c6348e930fbba513fa3095b10971df38b09c511c3b19b0efe40146234e6e13f911f432430f432204bfae94eab1ae51492ffebc9c1c5de494c2d1a3329515044c69c0797d086b944fabcfa79b1fbbf2960af50f073d1da27ba9865bf000bb2610867204fc046a46d6bdc1f9815dec0cb905e5d33f1d43a601686580fbf57985f7a1a7d6a905"] }


Less details
source code | moneroexplorer