Monero Transaction 80dba2c0bcc0e88dff2e39d0ec47ba27f4513f76ed139722da19a4a75cd51719

Autorefresh is OFF

Tx hash: 80dba2c0bcc0e88dff2e39d0ec47ba27f4513f76ed139722da19a4a75cd51719

Tx public key: 1b4231b53b509a1c381afa8e99e71f569588d69abd534565d7e87c776f4c32e7

Transaction 80dba2c0bcc0e88dff2e39d0ec47ba27f4513f76ed139722da19a4a75cd51719 was carried out on the Monero network on 2014-08-14 19:20:19. The transaction has 3122381 confirmations. Total output fee is 0.005493859889 XMR.

Timestamp: 1408044019 Timestamp [UTC]: 2014-08-14 19:20:19 Age [y:d:h:m:s]: 10:114:21:38:04
Block: 173390 Fee (per_kB): 0.005493859889 (0.003617821560) Tx size: 1.5186 kB
Tx version: 1 No of confirmations: 3122381 RingCT/type: no
Extra: 011b4231b53b509a1c381afa8e99e71f569588d69abd534565d7e87c776f4c32e7

28 output(s) for total of 18.595000000000 xmr

stealth address amount amount idx tag
00: 355d11479f5f6e0f0ca786a58155ca68352ffad3b81580c241d18ea8a16eb8fe 0.005000000000 211289 of 308585 -
01: ef49c2ed07b08de4de030329b50bcea2a10f8e3bc6ca4f0df4fd6adc0b4e8f82 0.090000000000 105114 of 317822 -
02: a4a92b520cafff24bea215aba6ad2a0a5f020dd2fcfca9648c9e387fdf2444f1 0.200000000000 364556 of 1272210 -
03: 8b34c3648d3b962c4a00ceee9fdc6580781bbdd47edf9ee843ad2b817b976873 0.300000000000 162758 of 976536 -
04: f53159cdd6f4620d5af51a059634e0c1e83c536e69136024c7274b54d0da31a4 0.300000000000 162759 of 976536 -
05: a64b76b708958f34ee652bc4bf44198c5f76f35c861597dbec3b75bb5b8147fa 0.500000000000 226856 of 1118624 -
06: 4fd81a2f5dc45335705ab37906ea4f669fa2a4561cf63b96505afe79cbacae0c 0.500000000000 226857 of 1118624 -
07: 71b70c79ad25585c0a9927e851517cb6ce3ea11a89fd33c14fd4324dfa15907f 0.500000000000 226858 of 1118624 -
08: d23709bae3cd7e43fac2fcaaf24228682142ba86a0beac6ac6e2b6ae02c61397 0.500000000000 226859 of 1118624 -
09: 5db9becf1f715b53cc7b9b9bd1d7a1db8b4bb5ab3764ad7fb59d441118249a4e 0.500000000000 226860 of 1118624 -
10: 1f4f9a661035a0450f582be853985469271091e256898c4671bd5b9338cd45b0 0.500000000000 226861 of 1118624 -
11: 0818fdc8d1b0a0206e0c9154faf0ddbb8e9f7a9e941163a5c905e7bce0d82227 0.500000000000 226862 of 1118624 -
12: a0d7d1cc0eda5b23f7e5244185d6d34e53e0e31d5c426add6775fb99936b8321 0.500000000000 226863 of 1118624 -
13: 4ce432cef188efe65763eae51a000e61be93534288f9e150478a9b07038a4818 0.500000000000 226864 of 1118624 -
14: ea901bc1538ff1f75fb56f23151184986b3e002772408f3def4ffc43d4149b0a 0.500000000000 226865 of 1118624 -
15: 59e5f598e491d512c185ddff4a39c15bb03e9440e43276de85afd663287c7438 0.500000000000 226866 of 1118624 -
16: 78b3c1b090ad0a78562710035a7be71842d284f28b2fcf83a5e962619c0e0c36 0.600000000000 149272 of 650760 -
17: caaf581d5e0e3cb5dd5cfb774300b6e5dfb1cad3f092028d2bf8b1d276d26e10 0.600000000000 149273 of 650760 -
18: 8c8684f46ec71a48286344fa952e12d0fa0b6827d1e35f486da874fe0c5f9569 0.600000000000 149274 of 650760 -
19: 2b19036fb1b2c943328af6fcb8dc13c92adea09dbc9909b210431b4f61417575 0.600000000000 149275 of 650760 -
20: a8686178223f7c4ac3b1179a91585f1326620bce182de116ca8e0a787d334888 0.700000000000 108105 of 514467 -
21: aac0847dd2cd2fd17cee1e551fccf81a3834ce49ccc52f4577c4388322e304d9 0.700000000000 108106 of 514467 -
22: b86a7767559525e30b46358681c8dc7973b26d0fcefee8aa68287739f7f9c3d3 0.700000000000 108107 of 514467 -
23: fd260209b305a82af16bd1de19a025be082bfb134da13da4034a5d88d7d4d42e 0.800000000000 112768 of 489955 -
24: 5fa164533347755ec0bbe8da066aa48a28642d356de68ec83f10f1323e44b42a 0.900000000000 89371 of 454894 -
25: 346969ebb4e2205f1e068e52c412acfaee8e9d8f80a65ffdbbb1ffba48437551 1.000000000000 190097 of 874629 -
26: cc6765839fb004fcfbc699e96282915e53cfa275119fd51df6c6031cec87011d 1.000000000000 190098 of 874629 -
27: aed0ff0c7192c764b32e8bb44a1fe389da81db0aaa692e4c6beabd3978b64f6e 4.000000000000 40141 of 237197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



4 inputs(s) for total of 18.600493859889 xmr

key image 00: da730ca57c883fc5838b8bc93de1a00f2394490ab8a24d2b1d24c2bac9838379 amount: 0.000493859889
ring members blk
- 00: 10036dce1f96b6ba87328d1fa0c86fa388c91a735878f51e2e258d1b2251ac9a 00171591
key image 01: 742758c2074f2d3ca81e4de852dcd2bb0904c448bf3f8034b1562f48c9595860 amount: 0.600000000000
ring members blk
- 00: 2182c064ab89f6c061c60e25bd0a0ccc329ba02c3aa88e6358ae08025fdbd25c 00171117
key image 02: e3a8bbe5c066a33341ff8c8243a8ea99cd5e0dbfc79843cf24fb328e69ef510b amount: 8.000000000000
ring members blk
- 00: 2ea8569cb65a044444242fa610529405c7ccb27a92d134c45fbada166f92c60a 00172139
key image 03: 4bf8b038e9d962c7f2b24390df53c9498cfc1de3c41f4efc080be2157a915662 amount: 10.000000000000
ring members blk
- 00: 318b16aeb5b395594ca631df4af9851734e962d69a649a6bda5fe0295ef6de03 00172264
More details
source code | moneroexplorer