Monero Transaction 80f92e7273d96c8080f3be38f0344854bb67c1c50029adfecc732cb03997537f

Autorefresh is OFF

Tx hash: 80f92e7273d96c8080f3be38f0344854bb67c1c50029adfecc732cb03997537f

Tx prefix hash: 428691c16f8f58e71c8e0ee5950acddff8a91cfe0828fe9e6dfadee9132c19f3
Tx public key: 2f54de331ac89b13a40243fc0103b4611e2accb4dc8d3dd987800cf1579d7bee
Payment id: 313e4734841dd15295b8d4e9069596ee3220d523a2192ac3f7e43a3e46451bed

Transaction 80f92e7273d96c8080f3be38f0344854bb67c1c50029adfecc732cb03997537f was carried out on the Monero network on 2014-06-10 19:41:11. The transaction has 3199119 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1402429271 Timestamp [UTC]: 2014-06-10 19:41:11 Age [y:d:h:m:s]: 10:156:01:46:18
Block: 79479 Fee (per_kB): 0.005000000000 (0.005824800910) Tx size: 0.8584 kB
Tx version: 1 No of confirmations: 3199119 RingCT/type: no
Extra: 022100313e4734841dd15295b8d4e9069596ee3220d523a2192ac3f7e43a3e46451bed012f54de331ac89b13a40243fc0103b4611e2accb4dc8d3dd987800cf1579d7bee

7 output(s) for total of 143.196000000000 xmr

stealth address amount amount idx tag
00: a474484ae121393bed78d9f5b2a963abb90723636c257c70a7b0f13392858d77 0.006000000000 80008 of 256624 -
01: 74f2b03a023db5a0c75c8e20dc01ac291927d8995a64a425bf283f71f569de79 0.020000000000 92699 of 381491 -
02: 7853802c608eb7f0dd4377fa72aa9ade3a639158a271f2afab322eccb1b0333e 0.070000000000 37561 of 263947 -
03: 5366d9ca63fbae440b9804f967b4b4fcc0a017452123e9c26c29cee86b3008ea 0.100000000000 66721 of 982315 -
04: f907ac658bfde8549a69937bc766db7bbb3a9cb3769fdd2e368ee3ea3853b0bc 3.000000000000 6860 of 300495 -
05: 5df6ec75f5d8fe42bb211e2f36342a0f46f34154d9d16f3256efddb0bfa15c8d 40.000000000000 680 of 41682 -
06: 8f8e2056afb26fee57342c2f522e6a67f476f8c1a54c2c7b2b7f3276e9441334 100.000000000000 1495 of 57197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-30 19:43:05 till 2014-06-07 23:33:16; resolution: 0.05 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |__________________________________________________________________________________________________________________________*_______________________________________________|
  • |__________________________________________________________________________________________________________________________*_______________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |__________________________________________________________________________________________________________________________*_______________________________________________|

5 inputs(s) for total of 143.201000000000 xmr

key image 00: 805fc9d073ef30798d138da2e45c347a29740d83d7a8cd506b5470af6efc2fbe amount: 0.001000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 635b8fb58de0c1d6c9c266659352f0b05d4a234bbc22ad6379f3484ffe143e4b 00063602 1 104/17 2014-05-30 20:43:05 10:167:00:44:24
key image 01: 0744b845d33241283195e5d96171ddb493da150353b5986d0cf53528aae80772 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: fc80723b3526f1fbef9e5f193a64654e4043bc781ff0967ce53785bf3b47d5d4 00072082 1 28/7 2014-06-05 16:53:41 10:161:04:33:48
key image 02: 38a9b2bb0684310b5a8fbf33e81f59f6a40d2ad48567854dd2cc41e751805632 amount: 80.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e6625bb63b9d5e38aff45941c5014e6f4b4c2719fc5fce4e94107fb0f9243719 00072082 1 28/7 2014-06-05 16:53:41 10:161:04:33:48
key image 03: 9fc7297767b8cd4898cca07576a56c905a5444d5befec66b663117380ef3791f amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5fa048d83e1faa4f1093e22363f08f70394d85d56aaeb93643290d6cab503d8c 00075315 1 3/12 2014-06-07 22:33:16 10:158:22:54:13
key image 04: 3ff91fcd0fdee307393d152e4fdbf1b1eaf6e1b6cdcc9fd4ed9b67d86bd00cf1 amount: 60.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d03b184d73317df60ca70015cabaf85e373ff294a490e6634acd318f390054de 00072059 1 5/6 2014-06-05 16:31:13 10:161:04:56:16
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 1000000000, "key_offsets": [ 35183 ], "k_image": "805fc9d073ef30798d138da2e45c347a29740d83d7a8cd506b5470af6efc2fbe" } }, { "key": { "amount": 200000000000, "key_offsets": [ 21533 ], "k_image": "0744b845d33241283195e5d96171ddb493da150353b5986d0cf53528aae80772" } }, { "key": { "amount": 80000000000000, "key_offsets": [ 337 ], "k_image": "38a9b2bb0684310b5a8fbf33e81f59f6a40d2ad48567854dd2cc41e751805632" } }, { "key": { "amount": 3000000000000, "key_offsets": [ 5548 ], "k_image": "9fc7297767b8cd4898cca07576a56c905a5444d5befec66b663117380ef3791f" } }, { "key": { "amount": 60000000000000, "key_offsets": [ 364 ], "k_image": "3ff91fcd0fdee307393d152e4fdbf1b1eaf6e1b6cdcc9fd4ed9b67d86bd00cf1" } } ], "vout": [ { "amount": 6000000000, "target": { "key": "a474484ae121393bed78d9f5b2a963abb90723636c257c70a7b0f13392858d77" } }, { "amount": 20000000000, "target": { "key": "74f2b03a023db5a0c75c8e20dc01ac291927d8995a64a425bf283f71f569de79" } }, { "amount": 70000000000, "target": { "key": "7853802c608eb7f0dd4377fa72aa9ade3a639158a271f2afab322eccb1b0333e" } }, { "amount": 100000000000, "target": { "key": "5366d9ca63fbae440b9804f967b4b4fcc0a017452123e9c26c29cee86b3008ea" } }, { "amount": 3000000000000, "target": { "key": "f907ac658bfde8549a69937bc766db7bbb3a9cb3769fdd2e368ee3ea3853b0bc" } }, { "amount": 40000000000000, "target": { "key": "5df6ec75f5d8fe42bb211e2f36342a0f46f34154d9d16f3256efddb0bfa15c8d" } }, { "amount": 100000000000000, "target": { "key": "8f8e2056afb26fee57342c2f522e6a67f476f8c1a54c2c7b2b7f3276e9441334" } } ], "extra": [ 2, 33, 0, 49, 62, 71, 52, 132, 29, 209, 82, 149, 184, 212, 233, 6, 149, 150, 238, 50, 32, 213, 35, 162, 25, 42, 195, 247, 228, 58, 62, 70, 69, 27, 237, 1, 47, 84, 222, 51, 26, 200, 155, 19, 164, 2, 67, 252, 1, 3, 180, 97, 30, 42, 204, 180, 220, 141, 61, 217, 135, 128, 12, 241, 87, 157, 123, 238 ], "signatures": [ "77f4f07b54f926edf2dc0fe127254adc44d582f1faf9f8c851b23b5914f1540ff6acf8a46b85b87f8c3560b08ce4831121c4127c5f2125b5859268c39cc45a09", "147e8721359ed9708648e368918681c6d2dd199d8dac675349502324a59f8f0a1eee62803b3f7c8cb161d93317d5acf71535f7eb7d934c90d5222ebb61f97b02", "e576b8626561a3c95651e207df0ef34480ffbf3612732315cc3af257fe658f08e46dc36ff791527de5345f26ecfcad5428c150668008ac00561d09ad29491b0f", "7928556f656877ba97bbb2db467f988478ae2502a0fe998c5c2bddf8b36c2a02007ea429126cde5b4e3dd0be9673390acb6bd1af53bf683a4f6e7f16e3f9c20a", "e093d6da545deb9c32d6015e629cd96c7a7e9bc3a6f96814da6cdd796fc2e102f2a317fbc87df679977d902578c59e8756837da807d1d2fb5d74488dfb219b00"] }


Less details
source code | moneroexplorer