Monero Transaction 80871add08c7ad54c62faf6ddf7a5623d3045ab73bea98f10590cf8d1df0108f

Autorefresh is OFF

Tx hash: 80871add08c7ad54c62faf6ddf7a5623d3045ab73bea98f10590cf8d1df0108f

Tx public key: 84e69e810c4cc60856a8673dd9cfb0a574fb64d03e5221d9778d982cac8f5713
Payment id: 7790bc400435afe74ebd700417e2cca3e947a3daf570b99305297198f7a3121c

Transaction 80871add08c7ad54c62faf6ddf7a5623d3045ab73bea98f10590cf8d1df0108f was carried out on the Monero network on 2015-01-26 13:03:01. The transaction has 2879604 confirmations. Total output fee is 0.019625430100 XMR.

Timestamp: 1422277381 Timestamp [UTC]: 2015-01-26 13:03:01 Age [y:d:h:m:s]: 09:304:21:58:36
Block: 408747 Fee (per_kB): 0.019625430100 (0.020423211811) Tx size: 0.9609 kB
Tx version: 1 No of confirmations: 2879604 RingCT/type: no
Extra: 0221007790bc400435afe74ebd700417e2cca3e947a3daf570b99305297198f7a3121c0184e69e810c4cc60856a8673dd9cfb0a574fb64d03e5221d9778d982cac8f5713

7 output(s) for total of 22.580374570000 xmr

stealth address amount amount idx tag
00: baed8b23ec5404cfce2b5763d0a1bf8e96baf248bcca7d67405167ee97aabb50 0.000374570000 5 of 6 -
01: 10fddd560aeb10b844ebd2b2a2f4f30f4e22c974cbcd86d751a8679244be6f09 0.030000000000 181053 of 324336 -
02: 0799e13ffa0727455eb6042fa16b767af048da72582179cba5a2afb6a979f8ac 0.050000000000 137095 of 284521 -
03: 6ce69933cae048570e09b1370928d3f04f2374f54b43a2b7da3ace04799b8074 0.200000000000 753501 of 1272210 -
04: b220afdae7cdb84050e57491d0bb9d4ba9c19bf7138bcd6d9bc2e90ddd4d4c43 0.300000000000 431394 of 976536 -
05: 2a403366ab535cff1b37b8dc4e83e4e0e52b2c6203d3c9efb71783857c747f9f 2.000000000000 235385 of 434057 -
06: 5099b9669c62cf10bf19239b60bc1adc7945b288865dba5b66d640cfea120c8e 20.000000000000 26394 of 78991 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



6 inputs(s) for total of 22.600000000100 xmr

key image 00: 6bb491162890ffb543f57f3313d7bb49e8cc59609f87601c894c510f64776b8d amount: 0.000000000100
ring members blk
- 00: e699df2ccb03c3e0a7f22760eabe6d1a63082de2097926e6cf33298e1891e9c9 00082097
key image 01: 282976596086d0d1fee12a034e9d8ce7794a7b38d741e2585d1276ce5bcfe308 amount: 10.000000000000
ring members blk
- 00: 63cf2d9891f066665b08c1f900d0501cafe635047a1c7184cd8d2287e3c28291 00402724
key image 02: 9d7a3433a291bba11f58a79dcaec175b5b845ff03dcee94e00d12ee85f9b51cd amount: 0.800000000000
ring members blk
- 00: f94029fc58c9d37290bbb7cfc6b8ad45edc620e05c87e64839fdc243ffc6cbb7 00394262
key image 03: 15a15ba2ec40bf56c040966bb22c94f5e4ca0099c94abaade74f15f34e5f5850 amount: 0.800000000000
ring members blk
- 00: 698542561b292ee279cb783f141865de4a6bdfa6caeee72a046b50fb7b7cd906 00408279
key image 04: b0f5e0bf7ad91e13570525fa15c127454a0e03a46510230797ba6d16708b4e4f amount: 5.000000000000
ring members blk
- 00: f500e50a0d3b6fee19e7179105b8f3699fb6aee7b0fd2f31af292a010460d8b7 00395420
key image 05: 71a1dfa1544abc3d9d06a2aa1f82ef7bf8d055b063d2c489f83f0c676ddea9c4 amount: 6.000000000000
ring members blk
- 00: a1ec70a6d7792ef2fd886b85a0533c1af5d304bbd5577c101dff454e574776ea 00404549
More details
source code | moneroexplorer