Monero Transaction a080f4db295a3f8bbffa649f88ef741abf2cee34002e0d9542801a80dac74d6c

Autorefresh is OFF

Tx hash: a080f4db295a3f8bbffa649f88ef741abf2cee34002e0d9542801a80dac74d6c

Tx prefix hash: 1d8b374066df730d77e2724f9aa4938bdfdd5d9a3455bd4d9cb4dc17b11e0d80
Tx public key: 58ce771dfb41320e8a4b6ebab114ff7c4cb4b708eb82e323da8ddc1916a07b1d
Payment id: fb7758388cc3b57ae65a9dc86eb88f9ec802641bda182fc78503c3a656f3cea3

Transaction a080f4db295a3f8bbffa649f88ef741abf2cee34002e0d9542801a80dac74d6c was carried out on the Monero network on 2014-07-31 17:28:53. The transaction has 3147646 confirmations. Total output fee is 0.005844580000 XMR.

Timestamp: 1406827733 Timestamp [UTC]: 2014-07-31 17:28:53 Age [y:d:h:m:s]: 10:136:03:08:04
Block: 153195 Fee (per_kB): 0.005844580000 (0.007772532364) Tx size: 0.7520 kB
Tx version: 1 No of confirmations: 3147646 RingCT/type: no
Extra: 022100fb7758388cc3b57ae65a9dc86eb88f9ec802641bda182fc78503c3a656f3cea30158ce771dfb41320e8a4b6ebab114ff7c4cb4b708eb82e323da8ddc1916a07b1d

9 output(s) for total of 10.064155420000 xmr

stealth address amount amount idx tag
00: 6e63a44dc63fef851652cc7b4e9f4f3f5c8ff5b4f023713a6088e3a0c84335d1 0.000155420000 0 of 1 -
01: 1fe9774f679229b62617a2a6c26dc1fd7e57a59dbc771ccbab27972d0cea6d8b 0.006000000000 176792 of 256624 -
02: 6e20137b246d0f9a8e0dd66160eaa9a4c4eb3f08ac9d8ad17faa557f0de6b65e 0.008000000000 160784 of 245068 -
03: 9612963577c4ca032a3d3e4c1f24cfa0923c39d2764b1dcb03597ddd65c07a30 0.070000000000 89971 of 263947 -
04: 1f23c237cb50fbc6bae20794707f0d41abb3f4900f38180b3e820806313da11b 0.080000000000 85272 of 269576 -
05: d9a5d6e62f4d6ec0c1c33038fdfa1f94505b5e4ad14671c53fbe620bf1b6c888 0.300000000000 137429 of 976536 -
06: fcbf3d77fdf1bd33119ae1e9493d6ee6c44dee7b9ff730b4624461531247f1f1 0.600000000000 122110 of 650760 -
07: 5040b5c3789e7b8e6d12b31f6f1e2b44661f3e3bc0318dbeb114d3217c172d8c 3.000000000000 37993 of 300495 -
08: 3247e74098e25bde37d134007fd18bc03efa5277d3ff4c9742b1b2228422154e 6.000000000000 72743 of 207703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-09 03:07:33 till 2014-07-31 14:27:01; resolution: 0.31 days)

  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |_______________*_________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 10.070000000000 xmr

key image 00: 0a322b4f56bfefb7b1863a0220edbc75a65b8a2a4086a9309dfc6e0b20931b94 amount: 0.070000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 35ee6adaa25b060d614dcccebb9705bbdd213b3d53ccf9e16bed104886e22ea8 00077061 1 31/99 2014-06-09 04:07:33 10:188:16:29:24
- 01: 2ff04f313e3cd2e3b035312f2fccfc49f0d5e4cdeab367c35fd16cfdc9a624d1 00152972 2 4/102 2014-07-31 13:27:01 10:136:07:09:56
key image 01: cd06c76a977b642888588624a5d7633e5fdcf434b1de7b3d8d08d3b63f2de690 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 006dc7abcf44c6631f2cb62ac0147f8a5e31b821e4a00f5567a28d7fd255e7d2 00083774 0 0/6 2014-06-13 17:41:56 10:184:02:55:01
- 01: da5c0f1728f1d5b52e4bc2e356f514af05fcab0a466e6bacc4f4eb48fc9fe68e 00152888 0 0/5 2014-07-31 12:06:38 10:136:08:30:19
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 70000000000, "key_offsets": [ 32781, 57131 ], "k_image": "0a322b4f56bfefb7b1863a0220edbc75a65b8a2a4086a9309dfc6e0b20931b94" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 87333, 87687 ], "k_image": "cd06c76a977b642888588624a5d7633e5fdcf434b1de7b3d8d08d3b63f2de690" } } ], "vout": [ { "amount": 155420000, "target": { "key": "6e63a44dc63fef851652cc7b4e9f4f3f5c8ff5b4f023713a6088e3a0c84335d1" } }, { "amount": 6000000000, "target": { "key": "1fe9774f679229b62617a2a6c26dc1fd7e57a59dbc771ccbab27972d0cea6d8b" } }, { "amount": 8000000000, "target": { "key": "6e20137b246d0f9a8e0dd66160eaa9a4c4eb3f08ac9d8ad17faa557f0de6b65e" } }, { "amount": 70000000000, "target": { "key": "9612963577c4ca032a3d3e4c1f24cfa0923c39d2764b1dcb03597ddd65c07a30" } }, { "amount": 80000000000, "target": { "key": "1f23c237cb50fbc6bae20794707f0d41abb3f4900f38180b3e820806313da11b" } }, { "amount": 300000000000, "target": { "key": "d9a5d6e62f4d6ec0c1c33038fdfa1f94505b5e4ad14671c53fbe620bf1b6c888" } }, { "amount": 600000000000, "target": { "key": "fcbf3d77fdf1bd33119ae1e9493d6ee6c44dee7b9ff730b4624461531247f1f1" } }, { "amount": 3000000000000, "target": { "key": "5040b5c3789e7b8e6d12b31f6f1e2b44661f3e3bc0318dbeb114d3217c172d8c" } }, { "amount": 6000000000000, "target": { "key": "3247e74098e25bde37d134007fd18bc03efa5277d3ff4c9742b1b2228422154e" } } ], "extra": [ 2, 33, 0, 251, 119, 88, 56, 140, 195, 181, 122, 230, 90, 157, 200, 110, 184, 143, 158, 200, 2, 100, 27, 218, 24, 47, 199, 133, 3, 195, 166, 86, 243, 206, 163, 1, 88, 206, 119, 29, 251, 65, 50, 14, 138, 75, 110, 186, 177, 20, 255, 124, 76, 180, 183, 8, 235, 130, 227, 35, 218, 141, 220, 25, 22, 160, 123, 29 ], "signatures": [ "520e2c36ed61490108028c421083ebde85dafbc18793c4dd1a78e1f75c7f6b09401b622777e4242abd0c3757b85dd39b1d547dc0628082f22abf96e9092cf90d24fad54ce722a0bb4a284eea3e7a6fcfb1c79e69c125b9895fbe907ccc0e9d0e6f26a135bb037d58dd786b6a7b4876601d040b78c1f755f7db811a42a310df07", "b88f1eb20809cd458e8009939a7ff49b16a7c0bea8707c85b042078345f9e50e437704831464eab681fa0fab773f3795deed1d491ee8c5b3aa5e53757236560832f36a38b606b2820c2868249b9a0a3c68df798f6e79c266e6e9c6aa90d7a10479cf38df2ddb13f181e51b2c7b7d3506b3e0ff90775ffc37040d88f832db310c"] }


Less details
source code | moneroexplorer