Monero Transaction 85f2fc1881348c60265f7309b74dafd89d27b28c0c94752f8e68e2090da0fec1

Autorefresh is OFF

Tx hash: 85f2fc1881348c60265f7309b74dafd89d27b28c0c94752f8e68e2090da0fec1

Tx prefix hash: b5f97003f7a285f931138d858ad874b1ab11630d0dd945f9698323ba2c467723
Tx public key: 4ce1f6370db2c8d81067fe7665aff390ea55bc8af4a66ae91b7f9adccf0810ef
Payment id: 22b49e2918424837c59a682431b8ad946896ab2fa9ee0316ae7bc7d7ba594ad8

Transaction 85f2fc1881348c60265f7309b74dafd89d27b28c0c94752f8e68e2090da0fec1 was carried out on the Monero network on 2016-09-11 17:45:26. The transaction has 2170548 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1473615926 Timestamp [UTC]: 2016-09-11 17:45:26 Age [y:d:h:m:s]: 08:097:23:47:47
Block: 1133805 Fee (per_kB): 0.010000000000 (0.023758700696) Tx size: 0.4209 kB
Tx version: 1 No of confirmations: 2170548 RingCT/type: no
Extra: 02210022b49e2918424837c59a682431b8ad946896ab2fa9ee0316ae7bc7d7ba594ad8014ce1f6370db2c8d81067fe7665aff390ea55bc8af4a66ae91b7f9adccf0810ef

3 output(s) for total of 0.990000000000 xmr

stealth address amount amount idx tag
00: 9072212ad8365964de443a20244d22b09906e023fab663e5fab40c6721fb6710 0.040000000000 254026 of 294095 -
01: c2671982c40d86919d56561c1ea36e178fc79fb82db4c2fc84cbc3a61e8ca231 0.050000000000 241867 of 284522 -
02: e60d0e1fd8c33b151691c9288d085dae21865b94008d35c9fbad2901a743716e 0.900000000000 396691 of 454894 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-03-01 14:31:08 till 2016-09-11 17:45:28; resolution: 3.29 days)

  • |_*____*__________________________________________________________________________________________________________________________________________________________________*|

1 inputs(s) for total of 1.000000000000 xmr

key image 00: c6c61d53f43cdd940a8015dcd86a7030f33f6b8629983c18ca21df92c2dc5818 amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c3fe03e3ebea1703570300330af082d6f6570c39a67c1d4e9ee3177330b7b609 00457603 0 0/4 2015-03-01 15:31:08 09:293:02:02:05
- 01: 8d05cef16c558635ddcc825d06e280cd13424f962f6d5fba7c148a913c98360e 00483917 0 0/4 2015-03-20 00:36:57 09:274:16:56:16
- 02: 877677ad0300f0163dbe68c2a35e7feadb06ca1eb2d4282ef9fe0c93e45526aa 01133783 4 2/4 2016-09-11 16:45:28 08:098:00:47:45
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 1000000000000, "key_offsets": [ 466771, 38545, 289363 ], "k_image": "c6c61d53f43cdd940a8015dcd86a7030f33f6b8629983c18ca21df92c2dc5818" } } ], "vout": [ { "amount": 40000000000, "target": { "key": "9072212ad8365964de443a20244d22b09906e023fab663e5fab40c6721fb6710" } }, { "amount": 50000000000, "target": { "key": "c2671982c40d86919d56561c1ea36e178fc79fb82db4c2fc84cbc3a61e8ca231" } }, { "amount": 900000000000, "target": { "key": "e60d0e1fd8c33b151691c9288d085dae21865b94008d35c9fbad2901a743716e" } } ], "extra": [ 2, 33, 0, 34, 180, 158, 41, 24, 66, 72, 55, 197, 154, 104, 36, 49, 184, 173, 148, 104, 150, 171, 47, 169, 238, 3, 22, 174, 123, 199, 215, 186, 89, 74, 216, 1, 76, 225, 246, 55, 13, 178, 200, 216, 16, 103, 254, 118, 101, 175, 243, 144, 234, 85, 188, 138, 244, 166, 106, 233, 27, 127, 154, 220, 207, 8, 16, 239 ], "signatures": [ "b1dbe5ec415216c6c785fd87fb44e87f82f71f42b8de399dc9c5a2e47e8af104ec5fa2116e3081ca4163fea180bb31c3b2b146db39d7076a86bbbd60a91a5e04312c9878179a3087ccdb8bdb6b5c2b8404d7288cbbb76bf35bab6323b05544091436ba50146ba8e3796c202e4ab0197e23015804823a9070fdf6ddb8399a4d0e6a6b4b77d8b7c7e9e14e0bd5b4cc7a995b88a70ecf42813e1bbcd065f27f0404b6d4964d5aeff2fd6e10a91dc5701ba7d5edf2c57976cc96d6f5a234d259cd04"] }


Less details
source code | moneroexplorer