Monero Transaction 488872a843b4ea4d894760705e69ad0335e53dd395e954493b6020ce22ce8653

Autorefresh is OFF

Tx hash: 488872a843b4ea4d894760705e69ad0335e53dd395e954493b6020ce22ce8653

Tx prefix hash: fa583d1d759b90c757b0b4319f40290398f285d7e37ac36d30d7769ff40dcb9c
Tx public key: 70830fa50692c0c03cbb0688827d05d9dd6ed7ebd3ea8fc7d7b86fd6a7558bad
Payment id: f52cf24188e74657d943062760da60dbace40a2af37262fc7ced4dc4a6ff3ed3

Transaction 488872a843b4ea4d894760705e69ad0335e53dd395e954493b6020ce22ce8653 was carried out on the Monero network on 2014-07-19 12:04:12. The transaction has 3152183 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1405771452 Timestamp [UTC]: 2014-07-19 12:04:12 Age [y:d:h:m:s]: 10:130:02:32:50
Block: 135557 Fee (per_kB): 0.010000000000 (0.021113402062) Tx size: 0.4736 kB
Tx version: 1 No of confirmations: 3152183 RingCT/type: no
Extra: 022100f52cf24188e74657d943062760da60dbace40a2af37262fc7ced4dc4a6ff3ed30170830fa50692c0c03cbb0688827d05d9dd6ed7ebd3ea8fc7d7b86fd6a7558bad

5 output(s) for total of 219.990000000000 xmr

stealth address amount amount idx tag
00: 5a08bf716830ca6cad8351f640d94ce6d1ed8ba8f196d72c17d77656598ae7a8 0.090000000000 84145 of 317822 -
01: 008e36fc4536022da1204ee410dce450a63cd2d24935d8a41fc53bc7036f4303 0.900000000000 58864 of 454894 -
02: 113045137d4c9d530c9712d9018b825dba1ebec86d1a97be9cb2d24e389c3245 9.000000000000 11655 of 274259 -
03: 48a11fd5d046e5e6e07c0f5fae78342d0a8d6bbcad400f86b2e495b650be0350 10.000000000000 153712 of 921411 -
04: e496fe809aa9a186ada3dcc9245eb4a219c708d64377d2ef06eff2ad8b154606 200.000000000000 1832 of 31883 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-17 01:34:14 till 2014-07-18 14:56:21; resolution: 0.01 days)

  • |_____________________________________________________________________________________________________________________________________________________________________*____|
  • |_____*____________________________________________________________________________________________________________________________________________________________________|

2 inputs(s) for total of 220.000000000000 xmr

key image 00: cac115087049e03f08945dc067d6d6ae2d619ba9100fc3c240b9f73d5325f88f amount: 200.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 872ebd5913dc29e35278cc67963d6d7611ee14e897cf7d0508b237f443eab48c 00134241 1 12/11 2014-07-18 13:56:21 10:131:00:40:41
key image 01: e3f0e0093033dd70204c34ae28cfb7ab7f421d56004d0b07e3d202f77b02ad18 amount: 20.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 2076cac44bc52f7fcb5c6d5a606d0fd1c6121ac0233b41c2d6ac3c190a0b6e51 00132071 1 5/9 2014-07-17 02:34:14 10:132:12:02:48
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 200000000000000, "key_offsets": [ 1810 ], "k_image": "cac115087049e03f08945dc067d6d6ae2d619ba9100fc3c240b9f73d5325f88f" } }, { "key": { "amount": 20000000000000, "key_offsets": [ 6090 ], "k_image": "e3f0e0093033dd70204c34ae28cfb7ab7f421d56004d0b07e3d202f77b02ad18" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "5a08bf716830ca6cad8351f640d94ce6d1ed8ba8f196d72c17d77656598ae7a8" } }, { "amount": 900000000000, "target": { "key": "008e36fc4536022da1204ee410dce450a63cd2d24935d8a41fc53bc7036f4303" } }, { "amount": 9000000000000, "target": { "key": "113045137d4c9d530c9712d9018b825dba1ebec86d1a97be9cb2d24e389c3245" } }, { "amount": 10000000000000, "target": { "key": "48a11fd5d046e5e6e07c0f5fae78342d0a8d6bbcad400f86b2e495b650be0350" } }, { "amount": 200000000000000, "target": { "key": "e496fe809aa9a186ada3dcc9245eb4a219c708d64377d2ef06eff2ad8b154606" } } ], "extra": [ 2, 33, 0, 245, 44, 242, 65, 136, 231, 70, 87, 217, 67, 6, 39, 96, 218, 96, 219, 172, 228, 10, 42, 243, 114, 98, 252, 124, 237, 77, 196, 166, 255, 62, 211, 1, 112, 131, 15, 165, 6, 146, 192, 192, 60, 187, 6, 136, 130, 125, 5, 217, 221, 110, 215, 235, 211, 234, 143, 199, 215, 184, 111, 214, 167, 85, 139, 173 ], "signatures": [ "0fab55272f57c45d9528e8e4377cd4590cab2eb30f1b21c9f8a75b1e3efc7401cb8d9f67ff271fc6c65cc94c64533d4c859538cbd6efc36dc6679dfd05c0f00e", "5355e709edf681f9b270db1f097a64157812a4113507d0b5547757985f6cb70457f48ca5909f5f51a99c4f4e38e182cd1900640c7b39a8e5ca376031da48bd00"] }


Less details
source code | moneroexplorer