Monero Transaction 82b06b50aab84642da0eca06d9d24805629acba5bb6bba47f70803ce27f81e19

Autorefresh is OFF

Tx hash: 82b06b50aab84642da0eca06d9d24805629acba5bb6bba47f70803ce27f81e19

Tx prefix hash: d69a335ec9efe19daf87898d94625c423a5cc4866717d75782a5b8113bfacab9
Tx public key: f8098152c66f9693bf5b3d5c64bba692e90a3b035b3a140327a0664875c05773
Payment id: b033b248485e934bf50787267bbca85553e2d98e539e1232ed81f10c619b4a28

Transaction 82b06b50aab84642da0eca06d9d24805629acba5bb6bba47f70803ce27f81e19 was carried out on the Monero network on 2014-08-17 06:22:38. The transaction has 3124116 confirmations. Total output fee is 0.005921030000 XMR.

Timestamp: 1408256558 Timestamp [UTC]: 2014-08-17 06:22:38 Age [y:d:h:m:s]: 10:119:19:10:53
Block: 176877 Fee (per_kB): 0.005921030000 (0.006429623245) Tx size: 0.9209 kB
Tx version: 1 No of confirmations: 3124116 RingCT/type: no
Extra: 022100b033b248485e934bf50787267bbca85553e2d98e539e1232ed81f10c619b4a2801f8098152c66f9693bf5b3d5c64bba692e90a3b035b3a140327a0664875c05773

9 output(s) for total of 11.894078970000 xmr

stealth address amount amount idx tag
00: edd2651bf8e2df6878a80b08dbede5186a0115006d253ae251230d0180c0aedc 0.000078970000 0 of 1 -
01: 187103fe529f3ca38fa3c0356f7bf3538b3fe92642d73a8b7613be45e808b006 0.006000000000 184821 of 256624 -
02: 8eb905ea82e717f6b3a6e92192c765103f006ab06a31137fec60c65602b513c3 0.008000000000 168533 of 245068 -
03: 9a35de7c1a873bef94d30ec496362946f5787f31b4557699d0cf2bf3a9859e4b 0.020000000000 217728 of 381492 -
04: 323026b13830750c532a3b81ec04e5f8676c68fd13aa878daee82823f727a231 0.060000000000 106789 of 264760 -
05: be86f1da5b09fe0d56c1b4be691fdbfc2ce6eb3be0ef9fd59a90dbdb974cf094 0.200000000000 374969 of 1272210 -
06: 5ce6c82fa28f20a6159d92b962b3cf18dd91cb2eef1869368b1271eed553808b 0.600000000000 152908 of 650760 -
07: 4505ba800b228ee6cc13f44741314d7dba2f09f3e7c43c107961ca6328b1dfd9 5.000000000000 104674 of 255089 -
08: cf85d3d7eb90d53a2a2390312a0e4f28a1cfaad635a0ea06aa2fde01dc619cc8 6.000000000000 76157 of 207703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-04-26 21:31:23 till 2014-08-17 06:01:17; resolution: 0.66 days)

  • |______________________________________________________________________________________________________*__________________________________________________________________*|
  • |_________________________________________________________________________________________________________________________*_______________________________________________*|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|

3 inputs(s) for total of 11.900000000000 xmr

key image 00: e20eebead0c1c96f946cf39a1af4b56ce60bf8ea67d33f7b053ca003d792d003 amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 52ed6e16393ef822650fc6f8354e7eb2395083d64d7e0ce785651506c6b3147b 00112575 1 8/35 2014-07-03 13:21:19 10:164:12:12:12
- 01: d48dfd4b409cd120fe1d84fca2af538f446731affda19a65f1d2813fc1126680 00176783 0 0/5 2014-08-17 05:01:17 10:119:20:32:14
key image 01: 6a6402bf41917c4a28d3467ffe8800b7098bdf8aba7c3fc280884f1c4a1b1705 amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ac30638a84581446f9d48d420977e43585fee5e13b5085a94f43b4176852c59d 00130870 1 22/67 2014-07-16 07:41:21 10:151:17:52:10
- 01: 0848890b74f1cff2d56fadd9521711cba2f40d5209af016900faeec8c2bfd73a 00176561 0 0/6 2014-08-17 01:08:13 10:120:00:25:18
key image 02: 74b2acf571ee14ad8e2b8a7918e2ecc5829bcb5ccedc05cc6d39d1d72a5cd0ba amount: 7.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3da0db60a477c43ea45c00f651819b53a6e5720ee6a4339f7ca7afce5cbaa0a8 00012826 0 0/9 2014-04-26 22:31:23 10:232:03:02:08
- 01: a46b0a488576de4c8c14bec71088c70cd26010e356e74d41f841dd1688ac73d6 00176526 2 2/9 2014-08-17 00:30:14 10:120:01:03:17
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 4000000000000, "key_offsets": [ 18031, 26165 ], "k_image": "e20eebead0c1c96f946cf39a1af4b56ce60bf8ea67d33f7b053ca003d792d003" } }, { "key": { "amount": 900000000000, "key_offsets": [ 55702, 38886 ], "k_image": "6a6402bf41917c4a28d3467ffe8800b7098bdf8aba7c3fc280884f1c4a1b1705" } }, { "key": { "amount": 7000000000000, "key_offsets": [ 12826, 37506 ], "k_image": "74b2acf571ee14ad8e2b8a7918e2ecc5829bcb5ccedc05cc6d39d1d72a5cd0ba" } } ], "vout": [ { "amount": 78970000, "target": { "key": "edd2651bf8e2df6878a80b08dbede5186a0115006d253ae251230d0180c0aedc" } }, { "amount": 6000000000, "target": { "key": "187103fe529f3ca38fa3c0356f7bf3538b3fe92642d73a8b7613be45e808b006" } }, { "amount": 8000000000, "target": { "key": "8eb905ea82e717f6b3a6e92192c765103f006ab06a31137fec60c65602b513c3" } }, { "amount": 20000000000, "target": { "key": "9a35de7c1a873bef94d30ec496362946f5787f31b4557699d0cf2bf3a9859e4b" } }, { "amount": 60000000000, "target": { "key": "323026b13830750c532a3b81ec04e5f8676c68fd13aa878daee82823f727a231" } }, { "amount": 200000000000, "target": { "key": "be86f1da5b09fe0d56c1b4be691fdbfc2ce6eb3be0ef9fd59a90dbdb974cf094" } }, { "amount": 600000000000, "target": { "key": "5ce6c82fa28f20a6159d92b962b3cf18dd91cb2eef1869368b1271eed553808b" } }, { "amount": 5000000000000, "target": { "key": "4505ba800b228ee6cc13f44741314d7dba2f09f3e7c43c107961ca6328b1dfd9" } }, { "amount": 6000000000000, "target": { "key": "cf85d3d7eb90d53a2a2390312a0e4f28a1cfaad635a0ea06aa2fde01dc619cc8" } } ], "extra": [ 2, 33, 0, 176, 51, 178, 72, 72, 94, 147, 75, 245, 7, 135, 38, 123, 188, 168, 85, 83, 226, 217, 142, 83, 158, 18, 50, 237, 129, 241, 12, 97, 155, 74, 40, 1, 248, 9, 129, 82, 198, 111, 150, 147, 191, 91, 61, 92, 100, 187, 166, 146, 233, 10, 59, 3, 91, 58, 20, 3, 39, 160, 102, 72, 117, 192, 87, 115 ], "signatures": [ "49a7fbe07f59133e654e5237268af91582db3cd90d154d59dc61a031622ce70e28f94ddba8991a2a067a5a099b8efe1adb569fb5d42d702701927e2eb7e76b018fdb85750949adbfe92460dc15db1bcb02b1b468757472c98a2f6b9d73bf31015f74248752bb62d94a19b3c5c17003e08c01660e91ec90e84be58b124b304800", "8fac6f437346162869c70220eca8d089ac5e3f4309d6cd07dd74b863b20796012e8058f0d474cd46fd888411381ac1f3d82bbdaa4c6729fe4d772538a2f7a704d7ac142f78b63b41f3cb91c3ae7dde075f2b8c486922fa63b7a0fa65d36aed08e1d2a164df5b0dc4e888ad66db8371c41ce689636c991330b38e4dc2f490370a", "da9862ced22f63f2c69d45d6101ac195940566947f10672fffdd9254cf6f2203c62052d6e21efa57f2f825119fcd8d111acd867217b49a87e7fac42dd30af909530b020977d2850119875b0051df54380d5783e415d642b1e42f1e30eb5c1901602da2c947d868d39bd5070823676290d4eafe6877432b12567cb44f2cd8c30e"] }


Less details
source code | moneroexplorer