Monero Transaction 80bad0d7c0895be3fc1b16df3d068cb08e248e01e77ef6f5b3f206b3e32847ed

Autorefresh is OFF

Tx hash: 80bad0d7c0895be3fc1b16df3d068cb08e248e01e77ef6f5b3f206b3e32847ed

Tx prefix hash: 984ba2a76ff16a3d0d8275980b4de106ceb378a6826c39433c8bfe04abcab88b
Tx public key: ffadf8416b0886783a3a99c88abd973ff9f4eaf813be484f471f52a2c79c9f55
Payment id: 138b50400cd27cea0389fd8ccdce93ef4a594e236f0fa950238de72782e825a6

Transaction 80bad0d7c0895be3fc1b16df3d068cb08e248e01e77ef6f5b3f206b3e32847ed was carried out on the Monero network on 2014-06-20 15:47:18. The transaction has 3184570 confirmations. Total output fee is 0.005700000000 XMR.

Timestamp: 1403279238 Timestamp [UTC]: 2014-06-20 15:47:18 Age [y:d:h:m:s]: 10:146:00:17:14
Block: 93859 Fee (per_kB): 0.005700000000 (0.010670566728) Tx size: 0.5342 kB
Tx version: 1 No of confirmations: 3184570 RingCT/type: no
Extra: 022100138b50400cd27cea0389fd8ccdce93ef4a594e236f0fa950238de72782e825a601ffadf8416b0886783a3a99c88abd973ff9f4eaf813be484f471f52a2c79c9f55

4 output(s) for total of 1.197000000000 xmr

stealth address amount amount idx tag
00: be07ac88dcb2d6d8a7e9df85508db61f1fd076a93a3ab081f4a9e69b27ca491b 0.007000000000 143588 of 247340 -
01: 359084b0b94d99be9982288f9353ae0d54096190116e9a35e5d25a75a68ad292 0.090000000000 59848 of 317822 -
02: 502b8faf17a4c05ed763d58e35cafadb490d628577d303807dd1d787a17407f4 0.100000000000 133509 of 982315 -
03: 98b52f9807ae0530ea883c563adfee47234523945514ed822cb2c96f081ac10c 1.000000000000 33696 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-19 06:45:27 till 2014-06-20 15:32:10; resolution: 0.01 days)

  • |______*___________________________________________________________________________________________________________________________________________________________________|
  • |___________________________________________________________________________________________________________________________________________*______________________________|
  • |____________________________________________________________________________________________________________________________________________________________________*_____|

3 inputs(s) for total of 1.202700000000 xmr

key image 00: 852e1389d8b24f3e5f25bc0d4295b94f0d4b8fb5b734b500594f814395767379 amount: 0.002700000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: cf36b42beaa9493ec1b1a2fc07f00a87f3612b76e1584cdd0c722f7a8d025858 00091891 1 36/46 2014-06-19 07:45:27 10:147:08:19:05
key image 01: e7874f40841b3234264d973dfa490ea0a38e5c14b82351326f547c18802e69ba amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ff863689b3e02f18e657986f0777dd691e23ec6c9439f9643c290e19e8413ba1 00093466 1 33/63 2014-06-20 09:31:32 10:146:06:33:00
key image 02: 1a567787efe08f0f52dfe8b674a7898579c064dbf508bbbd8ed929ca520931ec amount: 0.700000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1707d2d116de3cb1565ed908d52595723560e567f59b9f1d1c0e8d1b6b253fe2 00093780 1 14/66 2014-06-20 14:32:10 10:146:01:32:22
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 2700000000, "key_offsets": [ 401 ], "k_image": "852e1389d8b24f3e5f25bc0d4295b94f0d4b8fb5b734b500594f814395767379" } }, { "key": { "amount": 500000000000, "key_offsets": [ 36062 ], "k_image": "e7874f40841b3234264d973dfa490ea0a38e5c14b82351326f547c18802e69ba" } }, { "key": { "amount": 700000000000, "key_offsets": [ 24399 ], "k_image": "1a567787efe08f0f52dfe8b674a7898579c064dbf508bbbd8ed929ca520931ec" } } ], "vout": [ { "amount": 7000000000, "target": { "key": "be07ac88dcb2d6d8a7e9df85508db61f1fd076a93a3ab081f4a9e69b27ca491b" } }, { "amount": 90000000000, "target": { "key": "359084b0b94d99be9982288f9353ae0d54096190116e9a35e5d25a75a68ad292" } }, { "amount": 100000000000, "target": { "key": "502b8faf17a4c05ed763d58e35cafadb490d628577d303807dd1d787a17407f4" } }, { "amount": 1000000000000, "target": { "key": "98b52f9807ae0530ea883c563adfee47234523945514ed822cb2c96f081ac10c" } } ], "extra": [ 2, 33, 0, 19, 139, 80, 64, 12, 210, 124, 234, 3, 137, 253, 140, 205, 206, 147, 239, 74, 89, 78, 35, 111, 15, 169, 80, 35, 141, 231, 39, 130, 232, 37, 166, 1, 255, 173, 248, 65, 107, 8, 134, 120, 58, 58, 153, 200, 138, 189, 151, 63, 249, 244, 234, 248, 19, 190, 72, 79, 71, 31, 82, 162, 199, 156, 159, 85 ], "signatures": [ "b472bf0199f8532b7e083cc525c7ff136b2263ae278738ceb27ddce42b40750ed3387e42cd69d0281aedab17696780cc4bee7828f68925c32dd39420e150e20a", "95133c83e5a8eaf7b34b3bee4ba802ca9d170600d40c00f8a7f045d013ce8a0b53394768bc203427a416bff880a9161779d2075f7b1159277764babd32bfcb0e", "74783ea73136271297b7386bd2a46a043ff73702e09b50401feea8f8381d9b08e123f421706b0a9a9011757fbd4e3f4de8747ee4f40c4444768a272e6aadd007"] }


Less details
source code | moneroexplorer