Monero Transaction 45c4ef2f71563f4b4d7024121cc6b9d091e3f1f0503c554574cf6d011d57a597

Autorefresh is OFF

Tx hash: 45c4ef2f71563f4b4d7024121cc6b9d091e3f1f0503c554574cf6d011d57a597

Tx prefix hash: c763f7ce56caa057498cc72a1aa9c80b5da81c8129525a9249f5804db5d70356
Tx public key: 0570f2acabbcae4be4a3b6f01944b915b878615d3d7cda55cd685fc20f04d708
Payment id: 4a10a6b2e80e90d5a1596e02c42ce184dda60183b98fad5c156c94207d66d460

Transaction 45c4ef2f71563f4b4d7024121cc6b9d091e3f1f0503c554574cf6d011d57a597 was carried out on the Monero network on 2016-02-20 20:44:48. The transaction has 2327850 confirmations. Total output fee is 0.138119000000 XMR.

Timestamp: 1456001088 Timestamp [UTC]: 2016-02-20 20:44:48 Age [y:d:h:m:s]: 08:285:14:34:27
Block: 964852 Fee (per_kB): 0.138119000000 (0.164266963995) Tx size: 0.8408 kB
Tx version: 1 No of confirmations: 2327850 RingCT/type: no
Extra: 0221004a10a6b2e80e90d5a1596e02c42ce184dda60183b98fad5c156c94207d66d460010570f2acabbcae4be4a3b6f01944b915b878615d3d7cda55cd685fc20f04d708

9 output(s) for total of 3031.761881000000 xmr

stealth address amount amount idx tag
00: 5ed2ab1cef2c20b2357956e643ad1fe95bd8cf21fb155bcb53786e3eb4a81e67 0.061881000000 0 of 1 -
01: d85bafe2c5ef0eedce30609e374c536d98b4aa32e7d60fb1ae8858bb89b1489c 0.200000000000 1086952 of 1272210 -
02: 808ca6641a2f51d102452a10afbc676504df433b7278665ec45d0d956791bff5 0.500000000000 950933 of 1118624 -
03: 216fa82c70cb9efd91b3d208a28f048bb99f3b1d38f20c5fe5507faa5c68b118 2.000000000000 321421 of 434057 -
04: 07285094609af36ec04d339132797505f050b0c533a28f69870dd1abf6cd0455 9.000000000000 174877 of 274259 -
05: aee6028744731cc0610d361e0bb0e32c39e0b3c5783c2edff9ea469cda1093b7 20.000000000000 48757 of 78991 -
06: 7cf1985b28e89a192e3e7c6fa8cd81cbaf41962d5600a58a461e35e70f810bfe 300.000000000000 7476 of 16700 -
07: 675d841f7e8c9f298963f48917564443103e3e363b68ed11960ce847c0ab3f37 700.000000000000 2523 of 5886 -
08: 0cb9ceb8daf1f23d26fbc22ece54ab18bf7502e593ea44520e1121abab35dac4 2000.000000000000 2372 of 3772 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2016-02-20 16:06:04 till 2016-02-20 21:40:30; resolution: 0.00 days)

  • |_______________________________*__________________________________________________________________________________________________________________________________________|
  • |_______________________________*__________________________________________________________________________________________________________________________________________|
  • |___________________________________________________________________________________________________________________________________________*______________________________|
  • |___________________________________________________________________________________________________________________________________________*______________________________|

4 inputs(s) for total of 3031.900000000000 xmr

key image 00: add8e7931366c74a028a7f0ae319f939478c9082f60a837f43677768796429db amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 37fa071bc463ea51db9c0538b6988222037bfe8fa0f830e43000d2704ba856d1 00964642 1 14/6 2016-02-20 17:06:04 08:285:18:13:11
key image 01: 2f5dc4bce6ecd4224eb73d7db03c636c00d235195a889d9914e6db4f22a80b8f amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 21417ca1ca16619f622ca48d00df7a8c7d1dd0e782d8aba7017378463ec72537 00964642 1 14/6 2016-02-20 17:06:04 08:285:18:13:11
key image 02: 7f0026480948ec121d879eae3279ff3c700f4c0a9c8b7ef4eda8c75d0bd61d20 amount: 30.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: cf742f79a6863fb92357f00ec5c7ca3253d1752da4d886fa51b58322f2cbb5a6 00964838 1 23/5 2016-02-20 20:40:30 08:285:14:38:45
key image 03: cbb95d0ba5933e627b6616bd614a3bdbfb5750c133d39c37f4497ad5b13c1cde amount: 3000.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4071145aa0cfab8fbcc8b939f3b5280a39e11a4804b8c6c15fa5685596f951b4 00964838 1 23/5 2016-02-20 20:40:30 08:285:14:38:45
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 900000000000, "key_offsets": [ 335044 ], "k_image": "add8e7931366c74a028a7f0ae319f939478c9082f60a837f43677768796429db" } }, { "key": { "amount": 1000000000000, "key_offsets": [ 683053 ], "k_image": "2f5dc4bce6ecd4224eb73d7db03c636c00d235195a889d9914e6db4f22a80b8f" } }, { "key": { "amount": 30000000000000, "key_offsets": [ 29070 ], "k_image": "7f0026480948ec121d879eae3279ff3c700f4c0a9c8b7ef4eda8c75d0bd61d20" } }, { "key": { "amount": 3000000000000000, "key_offsets": [ 1351 ], "k_image": "cbb95d0ba5933e627b6616bd614a3bdbfb5750c133d39c37f4497ad5b13c1cde" } } ], "vout": [ { "amount": 61881000000, "target": { "key": "5ed2ab1cef2c20b2357956e643ad1fe95bd8cf21fb155bcb53786e3eb4a81e67" } }, { "amount": 200000000000, "target": { "key": "d85bafe2c5ef0eedce30609e374c536d98b4aa32e7d60fb1ae8858bb89b1489c" } }, { "amount": 500000000000, "target": { "key": "808ca6641a2f51d102452a10afbc676504df433b7278665ec45d0d956791bff5" } }, { "amount": 2000000000000, "target": { "key": "216fa82c70cb9efd91b3d208a28f048bb99f3b1d38f20c5fe5507faa5c68b118" } }, { "amount": 9000000000000, "target": { "key": "07285094609af36ec04d339132797505f050b0c533a28f69870dd1abf6cd0455" } }, { "amount": 20000000000000, "target": { "key": "aee6028744731cc0610d361e0bb0e32c39e0b3c5783c2edff9ea469cda1093b7" } }, { "amount": 300000000000000, "target": { "key": "7cf1985b28e89a192e3e7c6fa8cd81cbaf41962d5600a58a461e35e70f810bfe" } }, { "amount": 700000000000000, "target": { "key": "675d841f7e8c9f298963f48917564443103e3e363b68ed11960ce847c0ab3f37" } }, { "amount": 2000000000000000, "target": { "key": "0cb9ceb8daf1f23d26fbc22ece54ab18bf7502e593ea44520e1121abab35dac4" } } ], "extra": [ 2, 33, 0, 74, 16, 166, 178, 232, 14, 144, 213, 161, 89, 110, 2, 196, 44, 225, 132, 221, 166, 1, 131, 185, 143, 173, 92, 21, 108, 148, 32, 125, 102, 212, 96, 1, 5, 112, 242, 172, 171, 188, 174, 75, 228, 163, 182, 240, 25, 68, 185, 21, 184, 120, 97, 93, 61, 124, 218, 85, 205, 104, 95, 194, 15, 4, 215, 8 ], "signatures": [ "27db241786bded35d7bc039899ecf3182e7212ac87de63f96cab3e86574dbd04b2df44937ddc3406267dabcefca1c711b07e719f8a9db79e215293e56048b40f", "bda9c436ee13fdf752b22a5b692527737ec1ce2e668504efaea1d5fce89d2805fbdb4a28052d992e92d8971e4dd62b7889be0c1da77d499143e2d60f61b8a80e", "ca7389b23010b351f15ba3489d681f1e0c3ad772775347bd0ac499668ceb1f038b19665c651d36bdc987819be4127837b5eece508fd0041a1472429d1cc3550d", "72d083ba5e73752e657dddc2247c7148ed152be68f954189b6a023c9c75271062c8921b4db4daf21cc9024196657e27c8e96d9f8378f67583de0cd97b0bcdb0d"] }


Less details
source code | moneroexplorer