Monero Transaction 945644edeef271c21541e2d7a65acee06647391cdba64fc474dc848cd021a680

Autorefresh is OFF

Tx hash: 945644edeef271c21541e2d7a65acee06647391cdba64fc474dc848cd021a680

Tx prefix hash: 45f28a32952268bb67df95916d023e04af52f9b15c9795fa33d1ea9cc185ec17
Tx public key: e7e47f7f832414d6de73723ea7e62b6365d282e5318e3f3e62686afdc790d18d
Payment id: 795738d8aa5a31adf2f27d19e4c89fe1948cd547f923bc0af0c7de1c3e4cd3d6

Transaction 945644edeef271c21541e2d7a65acee06647391cdba64fc474dc848cd021a680 was carried out on the Monero network on 2015-04-05 12:54:37. The transaction has 2794698 confirmations. Total output fee is 0.130632088146 XMR.

Timestamp: 1428238477 Timestamp [UTC]: 2015-04-05 12:54:37 Age [y:d:h:m:s]: 09:255:08:14:48
Block: 507582 Fee (per_kB): 0.130632088146 (0.211657054211) Tx size: 0.6172 kB
Tx version: 1 No of confirmations: 2794698 RingCT/type: no
Extra: 022100795738d8aa5a31adf2f27d19e4c89fe1948cd547f923bc0af0c7de1c3e4cd3d601e7e47f7f832414d6de73723ea7e62b6365d282e5318e3f3e62686afdc790d18d

6 output(s) for total of 68.769367911854 xmr

stealth address amount amount idx tag
00: 104a2ee22ec60db7546a5dfe1a8dc675602eb34854004d7b771d2fd1de7da653 0.069367911854 0 of 1 -
01: 6ec893ed04768a56101494d0dbbd48474aacba7718147e66641b825c335cb541 0.300000000000 508706 of 976536 -
02: dee9eb205c23c186163ed7a2d7dc181183a20b8a7e1a727088a2fad52ad37820 0.400000000000 387567 of 688584 -
03: 81cc2785b0c2cee7c64944b4ecbddd87e04477bd21aa8f2e696a8ac6e01cf14e 8.000000000000 36041 of 226902 -
04: b8d74295500c14e4db61b145cfde3fcb95399d4ea5248404f7fc6c8ac103e52f 10.000000000000 581603 of 921411 -
05: e914826e7e791f8fe0643698063508a177b02ccc005fd3608f8ba39abb06d63d 50.000000000000 14027 of 44703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-04-04 04:53:48 till 2015-04-05 13:01:23; resolution: 0.01 days)

  • |____________________________________________________________________________________________________________________________________________________________________*_____|
  • |_________________________________________________________________________________________________________________________________________________________________*________|
  • |______*___________________________________________________________________________________________________________________________________________________________________|

3 inputs(s) for total of 68.900000000000 xmr

key image 00: bfe0824004b9d2289e38eff165437e1f462bbfc2fe63d14679cb5bfe13fa0f52 amount: 8.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9bea05eccd91636c1e353e5ec4d926f590c9bb34ccb6dc1132acf39a2fb475c7 00507526 1 3/7 2015-04-05 12:01:23 09:255:09:08:02
key image 01: 75ccce6958989f40ae713d3c90902bc0fda73cda8a05d54bc20f910b1f6beccc amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ecb505843d8129ebf2c290779130d3669235ef707f4c9af03c51d295eba8945b 00507477 1 1/3 2015-04-05 11:25:04 09:255:09:44:21
key image 02: 697bdf58bcaf076a0b4c7a46e312463ebf54ae55273b906369cea7bab4ec8177 amount: 60.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: da54db194d44ca03f0119c6d713c1153080781547212d96a402cef4083e490ad 00505709 1 8/5 2015-04-04 05:53:48 09:256:15:15:37
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 8000000000000, "key_offsets": [ 36031 ], "k_image": "bfe0824004b9d2289e38eff165437e1f462bbfc2fe63d14679cb5bfe13fa0f52" } }, { "key": { "amount": 900000000000, "key_offsets": [ 230755 ], "k_image": "75ccce6958989f40ae713d3c90902bc0fda73cda8a05d54bc20f910b1f6beccc" } }, { "key": { "amount": 60000000000000, "key_offsets": [ 7202 ], "k_image": "697bdf58bcaf076a0b4c7a46e312463ebf54ae55273b906369cea7bab4ec8177" } } ], "vout": [ { "amount": 69367911854, "target": { "key": "104a2ee22ec60db7546a5dfe1a8dc675602eb34854004d7b771d2fd1de7da653" } }, { "amount": 300000000000, "target": { "key": "6ec893ed04768a56101494d0dbbd48474aacba7718147e66641b825c335cb541" } }, { "amount": 400000000000, "target": { "key": "dee9eb205c23c186163ed7a2d7dc181183a20b8a7e1a727088a2fad52ad37820" } }, { "amount": 8000000000000, "target": { "key": "81cc2785b0c2cee7c64944b4ecbddd87e04477bd21aa8f2e696a8ac6e01cf14e" } }, { "amount": 10000000000000, "target": { "key": "b8d74295500c14e4db61b145cfde3fcb95399d4ea5248404f7fc6c8ac103e52f" } }, { "amount": 50000000000000, "target": { "key": "e914826e7e791f8fe0643698063508a177b02ccc005fd3608f8ba39abb06d63d" } } ], "extra": [ 2, 33, 0, 121, 87, 56, 216, 170, 90, 49, 173, 242, 242, 125, 25, 228, 200, 159, 225, 148, 140, 213, 71, 249, 35, 188, 10, 240, 199, 222, 28, 62, 76, 211, 214, 1, 231, 228, 127, 127, 131, 36, 20, 214, 222, 115, 114, 62, 167, 230, 43, 99, 101, 210, 130, 229, 49, 142, 63, 62, 98, 104, 106, 253, 199, 144, 209, 141 ], "signatures": [ "20c9a0bca50a0afe5b6fd62caccf2e6b7769ac3e78f0d9d0d0895262a327a4025c44f122c37268c618b309512ef76a6bb5f2c2bb71421c62d2d2747201603704", "1b44c4ce5166b14036635ded74b6fe13e43084a609dd1981563928c8df38c8040edd3b2398fdcac0bc8997a7501618850d901d156f5ba43bdb59864a5d07e10b", "f27873c8b3f8e357e05c51fd4838962e326ec4830fe56e59a160daac5a48050a8c164637014eb0c134acff29aeb19da5beb662947f86e0dcc4e3d9d8da93b907"] }


Less details
source code | moneroexplorer