Monero Transaction 48a2580d3e456fee0099c5f544a9c37a23c8bfe39cc647d2767fdd106f3a858b

Autorefresh is OFF

Tx hash: 48a2580d3e456fee0099c5f544a9c37a23c8bfe39cc647d2767fdd106f3a858b

Tx prefix hash: decb6765ceb3e414bf6e8c8d91d9aacbcaff1946b4f1c7770acb461a5dc60b13
Tx public key: 294f1a9c9ec69f82dc0302e7f3f2478c3e032c9b61ae707e7c90180aae4826e8
Payment id: 315717278a47484da8b564c748b13ed161e78556f1694a048d47bece106a7e72

Transaction 48a2580d3e456fee0099c5f544a9c37a23c8bfe39cc647d2767fdd106f3a858b was carried out on the Monero network on 2014-08-13 06:54:42. The transaction has 3119596 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1407912882 Timestamp [UTC]: 2014-08-13 06:54:42 Age [y:d:h:m:s]: 10:109:13:11:52
Block: 171210 Fee (per_kB): 0.010000000000 (0.015585996956) Tx size: 0.6416 kB
Tx version: 1 No of confirmations: 3119596 RingCT/type: no
Extra: 022100315717278a47484da8b564c748b13ed161e78556f1694a048d47bece106a7e7201294f1a9c9ec69f82dc0302e7f3f2478c3e032c9b61ae707e7c90180aae4826e8

4 output(s) for total of 5.390000000000 xmr

stealth address amount amount idx tag
00: 5d4831bac3aadd7361b1614ab3b4902e6969d9f0cede2dbf932004c8f52d4685 0.090000000000 104027 of 317822 -
01: 9dcb846e72b2155660e0618f7de89b057fe01bf6c90c2ec23c18ca2834a6d85d 0.300000000000 159983 of 976536 -
02: a0cc43f3787ea4d4576562dac48a458b67a87301f522898cb0dc0c7c4c93b35c 1.000000000000 186483 of 874629 -
03: b675f533246bc885398b1bdfa44a69a8fa7210e0468618f9ddd6838e504206bd 4.000000000000 37541 of 237197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-08-11 11:25:31 till 2014-08-12 06:36:47; resolution: 0.00 days)

  • |________________________________________________________________________________________________________________________________________________________*_________________|
  • |_______________________________________________________________________________________________*__________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________*________|
  • |_________*________________________________________________________________________________________________________________________________________________________________|

4 inputs(s) for total of 5.400000000000 xmr

key image 00: 21a6e64b9eb12ba81dd438616e68e4932c467712f0aa3587f9020c29ff6452f2 amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a2329d595311eb7b08a8344f52c4f5ce9d10bf6ea11c441530ed9501ff96e3c5 00169629 5 16/46 2014-08-12 04:36:04 10:110:15:30:30
key image 01: 014114a6b90d6ebae1433ce9c8841a767eacb62dc1e96ca3f31ade0446760497 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 88c774cb57fc46357551117f1790034b036befbbd6bf3faf089542b53a8cd547 00169274 5 9/45 2014-08-11 22:12:07 10:110:21:54:27
key image 02: 302962c7ce084a4ee34c2e203784d3be3751cb37ba0125d87a347fd585d2c28d amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: fd733d7a78ecfafbc3c2d68a7f8601fdb11e39f109340a2b481e5282b0468093 00169698 5 15/47 2014-08-12 05:36:47 10:110:14:29:47
key image 03: 699abd441e219772257f83d5298d956083b67766e020188b7c04714163fc37d4 amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c0f1a167621ec72604d1577622158cecb53dbcc3e383293f041161d63d939908 00168698 5 17/47 2014-08-11 12:25:31 10:111:07:41:03
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 2000000000000, "key_offsets": [ 71993 ], "k_image": "21a6e64b9eb12ba81dd438616e68e4932c467712f0aa3587f9020c29ff6452f2" } }, { "key": { "amount": 500000000000, "key_offsets": [ 219269 ], "k_image": "014114a6b90d6ebae1433ce9c8841a767eacb62dc1e96ca3f31ade0446760497" } }, { "key": { "amount": 900000000000, "key_offsets": [ 83865 ], "k_image": "302962c7ce084a4ee34c2e203784d3be3751cb37ba0125d87a347fd585d2c28d" } }, { "key": { "amount": 2000000000000, "key_offsets": [ 71259 ], "k_image": "699abd441e219772257f83d5298d956083b67766e020188b7c04714163fc37d4" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "5d4831bac3aadd7361b1614ab3b4902e6969d9f0cede2dbf932004c8f52d4685" } }, { "amount": 300000000000, "target": { "key": "9dcb846e72b2155660e0618f7de89b057fe01bf6c90c2ec23c18ca2834a6d85d" } }, { "amount": 1000000000000, "target": { "key": "a0cc43f3787ea4d4576562dac48a458b67a87301f522898cb0dc0c7c4c93b35c" } }, { "amount": 4000000000000, "target": { "key": "b675f533246bc885398b1bdfa44a69a8fa7210e0468618f9ddd6838e504206bd" } } ], "extra": [ 2, 33, 0, 49, 87, 23, 39, 138, 71, 72, 77, 168, 181, 100, 199, 72, 177, 62, 209, 97, 231, 133, 86, 241, 105, 74, 4, 141, 71, 190, 206, 16, 106, 126, 114, 1, 41, 79, 26, 156, 158, 198, 159, 130, 220, 3, 2, 231, 243, 242, 71, 140, 62, 3, 44, 155, 97, 174, 112, 126, 124, 144, 24, 10, 174, 72, 38, 232 ], "signatures": [ "836dad8bd0b5aa3d783e35fc17586496c75556a2f401b4c9f1de8f77b4d1dc0642ef0ce1d0f770704aab50128ed7a50e43f82fa3f77e11dc166de0adc0ad880d", "c00678afc95ff8da7f33e4c25d5ff465d0e638a0b3d9de9dd5837ca694d5640f85ed2cfff6c2b822a3d0e1f6ade8db2debaf43f7a2cef05e929427befe5a2a07", "d7971d74ee57b8b330ed187b040ec82ac85fe3cd28b30374ddf7ce48a10d26058fac38482060044f5b1b9bbced66276643e0b294dab2373ba1c10f919490750d", "2329a6408b56ce3af121e9e796f269090f1a79b5b186d07829a8d6a8f275530549e839c43b6fc10f8f5411166d21645e757b6f02319cfbdef21ef9c80da4b005"] }


Less details
source code | moneroexplorer