Monero Transaction 45afeb568c281abe6ed798378c694a936918cbe9c8cbd9dbd8e3d7a5d5360ed2

Autorefresh is OFF

Tx hash: 45afeb568c281abe6ed798378c694a936918cbe9c8cbd9dbd8e3d7a5d5360ed2

Tx prefix hash: 5b9590d824064d5a5508ba067bc2dfbce2a472a82486e882da7cdb4835ccf494
Tx public key: 3e67fda45c53d4f15253bd216746289a3f066bd5089e1833050d5f03ad2e24d1
Payment id: c1929f405332b800650c6370cf3cf959977a154c520f65e9ae1b7b8adf1bc40a

Transaction 45afeb568c281abe6ed798378c694a936918cbe9c8cbd9dbd8e3d7a5d5360ed2 was carried out on the Monero network on 2015-08-03 15:53:17. The transaction has 2625088 confirmations. Total output fee is 0.134929307547 XMR.

Timestamp: 1438617197 Timestamp [UTC]: 2015-08-03 15:53:17 Age [y:d:h:m:s]: 09:138:05:08:08
Block: 679392 Fee (per_kB): 0.134929307547 (0.138861920531) Tx size: 0.9717 kB
Tx version: 1 No of confirmations: 2625088 RingCT/type: no
Extra: 022100c1929f405332b800650c6370cf3cf959977a154c520f65e9ae1b7b8adf1bc40a013e67fda45c53d4f15253bd216746289a3f066bd5089e1833050d5f03ad2e24d1

7 output(s) for total of 115.565070692453 xmr

stealth address amount amount idx tag
00: b5989995fecfd2976f9a96607873483987f00642af161050992bd4d11493a407 0.065070692453 0 of 1 -
01: 997990965e6d90ffd0875a8210cf10a30489e69a9c8a1dccf6a075e0f672aee7 0.100000000000 783102 of 982315 -
02: b2224489f4f487ca0f6d0d5911c17a5b40501e4528af70d9970f9e97b5ff6989 0.400000000000 465486 of 688584 -
03: 0051120afa7205dad2ce2b7b10abbd285148df419bbf4b9b0d2a1eebd4ff1beb 6.000000000000 115829 of 207703 -
04: f9fc885bf8a5947444d0a6f70a5aaa7476b79f3453eeec8fb099d0c7d4364794 9.000000000000 134251 of 274259 -
05: ae1545bb96cd51caa88f2a77030be8b34d741d5151a9dd51df23c3a5b4ae50e5 40.000000000000 16382 of 41682 -
06: fd26a17d389b07a708be6e254e2aa1d863fcdc7b35ade1ebf3751e3172c72d5e 60.000000000000 9731 of 26317 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-08-02 07:00:13 till 2015-08-03 15:34:31; resolution: 0.01 days)

  • |___________________________________________*______________________________________________________________________________________________________________________________|
  • |_______________________________________________________________________________________*__________________________________________________________________________________|
  • |______*___________________________________________________________________________________________________________________________________________________________________|
  • |____________________________________________________________________________________________________________________________________________________________________*_____|
  • |____________________________________________________________________________________________________________________________________________________________________*_____|
  • |___________________________________________________________________________________________________________________*______________________________________________________|

6 inputs(s) for total of 115.700000000000 xmr

key image 00: c2bf80a131a03ede0d939c69fca6bd5ab72de4d1692c4aaa3645f08ec960ade5 amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d0f8baf3347405111d18b6b6ff0c80deedaa15112ce35a469c4ed6af6112664b 00677888 1 3/5 2015-08-02 15:10:18 09:139:05:51:07
key image 01: d53f3f0201550637522886484653ac4b70c1237db743537d023cf97e56202c86 amount: 9.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 2424df7240323d7769b8b46018c8b6baae9cec9bc2f1ef23f9e8d2835c68713b 00678347 1 2/4 2015-08-02 23:42:18 09:138:21:19:07
key image 02: 1cfa92337e96c5e6aadd55f67277343755c87c7467c315b4df724309744a47c8 amount: 7.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 807712abf2b1d912f0fc54ebd5f2c84f14e0e1673a9574d4537bd7cf0dcbc0eb 00677392 1 1/4 2015-08-02 08:00:13 09:139:13:01:12
key image 03: aac091c759e0229485a2183016cd1cb10e321018fad38f3b0219a61b51405bb4 amount: 0.700000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 055a873ed27eaedc838cfe79c0a39e083a623d961de61c03ccc166cdfeea3e5d 00679312 1 1/7 2015-08-03 14:34:31 09:138:06:26:55
key image 04: 8537939fe9d064f6e0b8a0b1f13f1a54c28f94db2948623b5c400e3db3179d72 amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3066ea6f6d50da4250204cba5b216b34462b363e101c1ac2f8833ef092faa2f6 00679312 1 1/7 2015-08-03 14:34:31 09:138:06:26:55
key image 05: 24a5a556482e2361034b68d6cf89e3f8b2d6e2b55d84003568fbf95299dbe1b8 amount: 90.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4b18e7784d8cc3fbbc6743165c5510c71be3538af0fa3e6c1e6765f9d5f9f898 00678656 1 1/7 2015-08-03 05:00:28 09:138:16:00:58
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000000, "key_offsets": [ 179435 ], "k_image": "c2bf80a131a03ede0d939c69fca6bd5ab72de4d1692c4aaa3645f08ec960ade5" } }, { "key": { "amount": 9000000000000, "key_offsets": [ 133172 ], "k_image": "d53f3f0201550637522886484653ac4b70c1237db743537d023cf97e56202c86" } }, { "key": { "amount": 7000000000000, "key_offsets": [ 84319 ], "k_image": "1cfa92337e96c5e6aadd55f67277343755c87c7467c315b4df724309744a47c8" } }, { "key": { "amount": 700000000000, "key_offsets": [ 344425 ], "k_image": "aac091c759e0229485a2183016cd1cb10e321018fad38f3b0219a61b51405bb4" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 170279 ], "k_image": "8537939fe9d064f6e0b8a0b1f13f1a54c28f94db2948623b5c400e3db3179d72" } }, { "key": { "amount": 90000000000000, "key_offsets": [ 12892 ], "k_image": "24a5a556482e2361034b68d6cf89e3f8b2d6e2b55d84003568fbf95299dbe1b8" } } ], "vout": [ { "amount": 65070692453, "target": { "key": "b5989995fecfd2976f9a96607873483987f00642af161050992bd4d11493a407" } }, { "amount": 100000000000, "target": { "key": "997990965e6d90ffd0875a8210cf10a30489e69a9c8a1dccf6a075e0f672aee7" } }, { "amount": 400000000000, "target": { "key": "b2224489f4f487ca0f6d0d5911c17a5b40501e4528af70d9970f9e97b5ff6989" } }, { "amount": 6000000000000, "target": { "key": "0051120afa7205dad2ce2b7b10abbd285148df419bbf4b9b0d2a1eebd4ff1beb" } }, { "amount": 9000000000000, "target": { "key": "f9fc885bf8a5947444d0a6f70a5aaa7476b79f3453eeec8fb099d0c7d4364794" } }, { "amount": 40000000000000, "target": { "key": "ae1545bb96cd51caa88f2a77030be8b34d741d5151a9dd51df23c3a5b4ae50e5" } }, { "amount": 60000000000000, "target": { "key": "fd26a17d389b07a708be6e254e2aa1d863fcdc7b35ade1ebf3751e3172c72d5e" } } ], "extra": [ 2, 33, 0, 193, 146, 159, 64, 83, 50, 184, 0, 101, 12, 99, 112, 207, 60, 249, 89, 151, 122, 21, 76, 82, 15, 101, 233, 174, 27, 123, 138, 223, 27, 196, 10, 1, 62, 103, 253, 164, 92, 83, 212, 241, 82, 83, 189, 33, 103, 70, 40, 154, 63, 6, 107, 213, 8, 158, 24, 51, 5, 13, 95, 3, 173, 46, 36, 209 ], "signatures": [ "7550ff9249a6cf83486fdbc4f62432775e2ccdd7274351dd452660e86ef7ae05bebcc9953300c46ecf28c366b40fd677f0ccac480b072942ef4c056a5f03510a", "8933577429c134766934b876261d0c16df125d500b983bc683725ba248ac91023282c900c4f3c9f1f2a2d109b086d9b62b768bc7cf9983ed4375ae746db9d50e", "5cef3fb30c5c9ed7669c6d353630d421e0765847f6f55e177f7b979e2e4ed8040044c89099fb8ebbbc456b96ed5378d8bb06091ab0235f925ae748755a1ae607", "cc99d92b9cd4dd6ce6efafb271d777bc2325b7a55c77c76bcbbc807e9ca9250beb85f3f6460d953da295ae059435070f7a2376bf7061e12bd8667343b61a0c05", "5b0bc88e82d92c8c7f7b7be649e302d5cff2efcd550dff9553726a8aac669a0b00f62f0982c4fd9291436a6f65be8d563f636593f31671a9f0effa1d3dab370e", "fa28cdd1481ea0b9b1fe72c966c4c91bd18e71f372466e6f54a5b1180be0fd0d7f5afb8d6149fdd62862f67e40d9a11ce0dd376942395deb998f3c7644f79003"] }


Less details
source code | moneroexplorer