Monero Transaction 980ff26eb8a3652c8a0e9e53c36dc7a2f49ee1d7de5359d52364a45b9f532026

Autorefresh is OFF

Tx hash: 980ff26eb8a3652c8a0e9e53c36dc7a2f49ee1d7de5359d52364a45b9f532026

Tx prefix hash: df1a33ddda2692d1469e6bb2fc73684469ddfc745bf0e33ffcdd804012c42be7
Tx public key: aed3a66f64b1357209cd042fba344560b723a780115587c878d74950633280de
Payment id (encrypted): c9b4f681b36c86d5

Transaction 980ff26eb8a3652c8a0e9e53c36dc7a2f49ee1d7de5359d52364a45b9f532026 was carried out on the Monero network on 2016-12-22 22:12:32. The transaction has 2094116 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1482444752 Timestamp [UTC]: 2016-12-22 22:12:32 Age [y:d:h:m:s]: 07:356:15:32:25
Block: 1207243 Fee (per_kB): 0.010000000000 (0.022212581345) Tx size: 0.4502 kB
Tx version: 1 No of confirmations: 2094116 RingCT/type: no
Extra: 01aed3a66f64b1357209cd042fba344560b723a780115587c878d74950633280de020901c9b4f681b36c86d5

1 output(s) for total of 0.020000000000 xmr

stealth address amount amount idx tag
00: 6642db5a3b655a3e79bd61db8b177679c830cfa3df8d7cf7919c7227abd53813 0.020000000000 367773 of 381492 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-15 16:10:50 till 2016-12-21 21:44:55; resolution: 5.41 days)

  • |_*______*________________________________________________*______________________________________________________*________________________________________________________*|

1 inputs(s) for total of 0.030000000000 xmr

key image 00: 05426401c74d61a20f78b232e7afc4d61017f516a11a5d6825984213cf9d239d amount: 0.030000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8ee1ad12dfffa029584750c58bf3cf58d2c1e20a1d76c6a8eac1d7363510688f 00086716 1 17/35 2014-06-15 17:10:50 10:182:20:34:07
- 01: 99cf2f81bdb586537a464fce6ce6596781ce3e5443faeaa13a09531eace67659 00146321 0 0/5 2014-07-26 23:04:34 10:141:14:40:23
- 02: 45507b2545e29ec623bb4b4777653bbbd373a8318cf2eb0749774c4422dd8705 00530174 0 0/4 2015-04-21 08:14:29 09:238:05:30:28
- 03: 11fc83cc08dee418175700c414b07e9e8f35ae2f65c4210869fd6b218ec3aec9 00950342 0 0/4 2016-02-10 14:30:59 08:307:23:13:58
- 04: b7d57050ba1dd4f7f59d7929ebb895547d0972c28ba108439c0e00b836d54491 01206483 3 1/11 2016-12-21 20:44:55 07:357:17:00:02
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 30000000000, "key_offsets": [ 108036, 44626, 42378, 55304, 60771 ], "k_image": "05426401c74d61a20f78b232e7afc4d61017f516a11a5d6825984213cf9d239d" } } ], "vout": [ { "amount": 20000000000, "target": { "key": "6642db5a3b655a3e79bd61db8b177679c830cfa3df8d7cf7919c7227abd53813" } } ], "extra": [ 1, 174, 211, 166, 111, 100, 177, 53, 114, 9, 205, 4, 47, 186, 52, 69, 96, 183, 35, 167, 128, 17, 85, 135, 200, 120, 215, 73, 80, 99, 50, 128, 222, 2, 9, 1, 201, 180, 246, 129, 179, 108, 134, 213 ], "signatures": [ "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"] }


Less details
source code | moneroexplorer