Monero Transaction 80cdb463ae57b7481f1b2aaa2294f83982c5c8d3746040b85a3c03b0a6e0b27e

Autorefresh is OFF

Tx hash: 80cdb463ae57b7481f1b2aaa2294f83982c5c8d3746040b85a3c03b0a6e0b27e

Tx prefix hash: cfd244df8b61cb131cb7237145b5f74277890c1b4644570fb70c144d0b5e0e72
Tx public key: b89a21363dd2ea4e22bb75268d7f1418c70a1d209c54ceb0601ebc650732e399
Payment id: 2d5966f7babcc41e39bb03edc7cd04e313c8ac056b230313cdfd0dbd57a5b89d

Transaction 80cdb463ae57b7481f1b2aaa2294f83982c5c8d3746040b85a3c03b0a6e0b27e was carried out on the Monero network on 2014-07-13 11:20:47. The transaction has 3151546 confirmations. Total output fee is 0.007000000000 XMR.

Timestamp: 1405250447 Timestamp [UTC]: 2014-07-13 11:20:47 Age [y:d:h:m:s]: 10:122:22:11:20
Block: 126692 Fee (per_kB): 0.007000000000 (0.008393442623) Tx size: 0.8340 kB
Tx version: 1 No of confirmations: 3151546 RingCT/type: no
Extra: 0221002d5966f7babcc41e39bb03edc7cd04e313c8ac056b230313cdfd0dbd57a5b89d01b89a21363dd2ea4e22bb75268d7f1418c70a1d209c54ceb0601ebc650732e399

9 output(s) for total of 243.993000000000 xmr

stealth address amount amount idx tag
00: 658a1e279a43903f543a4e43c179ac9774bc45845259eff1a67ef2e8647fc3d4 0.003000000000 36223 of 90176 -
01: 45f2633ad59478d91755745c0b7d5008945bfe3d590cb379e3d5e76c3406cc1d 0.040000000000 120028 of 294095 -
02: adf47f560d77e2290cce8f07f8436d62cf9c0902ed0395f3edbb7ec1d8082dc0 0.050000000000 104560 of 284521 -
03: 9d15db1bf82325cf795ddf543502f4f228e52b0a4d4c6a5fee3c1a6800757b22 0.900000000000 52916 of 454894 -
04: 679d89fc5a4a0f02a5c4c5d8fc597b5bdbbf88b970c39ed805eb4d0f99b1ce25 1.000000000000 98517 of 874629 -
05: 372f68a575d4f59400f61a134294340d80465073f079f95973a394f23bee4522 2.000000000000 40583 of 434057 -
06: d2c21f60997d9f6b3ec54fe9c39649ad5767e46f4dcafc7e1db577a288768fea 70.000000000000 947 of 24819 -
07: 24f26a4447a3cfafcddd7481e05cbed75a76a54d058cc833c24bc851f7d14f0f 70.000000000000 948 of 24819 -
08: ea0eb8f5e07ce319942c3bc9562c72a86ec893a0384e0314d64d3be576e6150c 100.000000000000 3237 of 57197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-07 08:49:07 till 2014-07-13 09:41:54; resolution: 0.04 days)

  • |__*_______________________________________________________________________________________________________________________________________________________________________|
  • |________________*_________________________________________________________________________________________________________________________________________________________|
  • |________________________________________________________________________________________________________________________________________________________________________*_|
  • |__________________________________*_______________________________________________________________________________________________________________________________________|

4 inputs(s) for total of 244.000000000000 xmr

key image 00: fdf9b34d8b76e84105863177ad0a3163847ce4d8ae13afd34a3465bf224039e3 amount: 70.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9434e6df9165b2ff21127133204a5a844a19d00e23e3a5b17289d835a42911f0 00118133 1 1/5 2014-07-07 09:49:07 10:128:23:43:00
key image 01: 35acd3610f1f1cfe4c3e0404747d9f5666550e5350c7a2ced26261ada1a912cb amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f11146d0bf0f39bf24e23ddc8095ce0aae9409dd9e199b333d5087748b321f9b 00118831 1 2/11 2014-07-07 21:42:25 10:128:11:49:42
key image 02: 8ff93adc68f0e623fc7dcea40080b4c53cccf2d6a21714cbed8de4b1ac9bd997 amount: 80.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 71cf5855f075b4b4b83eb1716c709a932ded239786c53fa93e9f9e447d42a43f 00126575 1 2/8 2014-07-13 08:41:54 10:123:00:50:13
key image 03: 5365ab37143b75c31b8ef2ce9ce00768c88afb1c9b51e256f0a1d3e99448c0db amount: 90.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d06e0d93c2b0719556e9b128efe20b03319e9aa4c97106b3b58782111b4c6fa1 00119735 1 12/4 2014-07-08 13:26:17 10:127:20:05:50
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 70000000000000, "key_offsets": [ 823 ], "k_image": "fdf9b34d8b76e84105863177ad0a3163847ce4d8ae13afd34a3465bf224039e3" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 20030 ], "k_image": "35acd3610f1f1cfe4c3e0404747d9f5666550e5350c7a2ced26261ada1a912cb" } }, { "key": { "amount": 80000000000000, "key_offsets": [ 962 ], "k_image": "8ff93adc68f0e623fc7dcea40080b4c53cccf2d6a21714cbed8de4b1ac9bd997" } }, { "key": { "amount": 90000000000000, "key_offsets": [ 1672 ], "k_image": "5365ab37143b75c31b8ef2ce9ce00768c88afb1c9b51e256f0a1d3e99448c0db" } } ], "vout": [ { "amount": 3000000000, "target": { "key": "658a1e279a43903f543a4e43c179ac9774bc45845259eff1a67ef2e8647fc3d4" } }, { "amount": 40000000000, "target": { "key": "45f2633ad59478d91755745c0b7d5008945bfe3d590cb379e3d5e76c3406cc1d" } }, { "amount": 50000000000, "target": { "key": "adf47f560d77e2290cce8f07f8436d62cf9c0902ed0395f3edbb7ec1d8082dc0" } }, { "amount": 900000000000, "target": { "key": "9d15db1bf82325cf795ddf543502f4f228e52b0a4d4c6a5fee3c1a6800757b22" } }, { "amount": 1000000000000, "target": { "key": "679d89fc5a4a0f02a5c4c5d8fc597b5bdbbf88b970c39ed805eb4d0f99b1ce25" } }, { "amount": 2000000000000, "target": { "key": "372f68a575d4f59400f61a134294340d80465073f079f95973a394f23bee4522" } }, { "amount": 70000000000000, "target": { "key": "d2c21f60997d9f6b3ec54fe9c39649ad5767e46f4dcafc7e1db577a288768fea" } }, { "amount": 70000000000000, "target": { "key": "24f26a4447a3cfafcddd7481e05cbed75a76a54d058cc833c24bc851f7d14f0f" } }, { "amount": 100000000000000, "target": { "key": "ea0eb8f5e07ce319942c3bc9562c72a86ec893a0384e0314d64d3be576e6150c" } } ], "extra": [ 2, 33, 0, 45, 89, 102, 247, 186, 188, 196, 30, 57, 187, 3, 237, 199, 205, 4, 227, 19, 200, 172, 5, 107, 35, 3, 19, 205, 253, 13, 189, 87, 165, 184, 157, 1, 184, 154, 33, 54, 61, 210, 234, 78, 34, 187, 117, 38, 141, 127, 20, 24, 199, 10, 29, 32, 156, 84, 206, 176, 96, 30, 188, 101, 7, 50, 227, 153 ], "signatures": [ "305d0ddc38a153cb1f1ca7b9f51da6dfd39028ff4c5832aa1964f47712d47e05b915aa7d2f287637e9d6051b36511e7326e8d3650ad7a1cafd6afd7e0d331705", "9a7520910847c4219089a63693d89acc5a3efbe3367464d2af62f0ef1c39110041b26f6e1c1d603e80fa61e29feb67912d1e139afcdba3956ff16202fca71f06", "47420e117c6109e40e99b6eedf853a7221e1056ea62d7999f3e756d3fda9c60e2253b1d82705e0fb63625d1daa4a88bb098d62329bdc446b8c5b0442ceaea00d", "36e7c0f058d8ea815a58be6d5b3bacb170ec4f393b39397b9128f46c7ea6e40e5423ced0dc924450031c3dffb3fd117ea1640e006b286c687c6bfc2e058eac04"] }


Less details
source code | moneroexplorer