Monero Transaction a80419272baa0de56f8c4aa9f2da7797e97fdc23b6ba572e296945a6ea639003

Autorefresh is OFF

Tx hash: a80419272baa0de56f8c4aa9f2da7797e97fdc23b6ba572e296945a6ea639003

Tx prefix hash: 7bb80b74a5eda9043778c720a47bc9250f06a9ed3df22564dea5fde4b9259abb
Tx public key: b0c494db75284623c3113d0b1449d1814511b87a6ca359b5bea9e61411a5e49e
Payment id: 60c0fc8ffcc90c75da6838e8683908d4e886908b6bbb62f295170204c13ef626

Transaction a80419272baa0de56f8c4aa9f2da7797e97fdc23b6ba572e296945a6ea639003 was carried out on the Monero network on 2014-07-04 13:41:43. The transaction has 3164463 confirmations. Total output fee is 0.005043494697 XMR.

Timestamp: 1404481303 Timestamp [UTC]: 2014-07-04 13:41:43 Age [y:d:h:m:s]: 10:132:04:02:09
Block: 114030 Fee (per_kB): 0.005043494697 (0.007921071426) Tx size: 0.6367 kB
Tx version: 1 No of confirmations: 3164463 RingCT/type: no
Extra: 02210060c0fc8ffcc90c75da6838e8683908d4e886908b6bbb62f295170204c13ef62601b0c494db75284623c3113d0b1449d1814511b87a6ca359b5bea9e61411a5e49e

4 output(s) for total of 1.495000000000 xmr

stealth address amount amount idx tag
00: 6832d11cc85535aa6f35fc042f5f6385b7d0d6c326b470cfe6c3ed1ea901431b 0.005000000000 182723 of 308584 -
01: 2bac67660bfa434994749c23c9e4811ccf4660262d7feb927c7578bd1d2bebb1 0.090000000000 73731 of 317822 -
02: f4058382d5159714aca94235b64480671a6192335305b632586d0a39ddf5c64b 0.400000000000 64500 of 688584 -
03: fd359472e15097660ad9c5ce314ecc2fbdca40315aa1d0a4042c887880877b06 1.000000000000 71347 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-21 17:06:25 till 2014-07-04 07:06:00; resolution: 0.07 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |________________________________________________________________________________________________________________________________________*_________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |__________________________________________________________________________________*_______________________________________________________________________________________|

4 inputs(s) for total of 1.500043494697 xmr

key image 00: d1c71792efeca717ff598f727ada1b4ac3c206782b5b1b8a65a67f841349b195 amount: 0.000043494697
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 194fe7c09b0f98bd040d5696e78cacc5c1014250d71ca3ea6fbee9435fb0a2a0 00095585 1 5/137 2014-06-21 18:06:25 10:144:23:37:27
key image 01: 82be696664c6ae7cf3f90e61fa27fd1cf42a7909602bd9ade6104bece71baf4f amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: fa94b23a13298cdd35761e6bc46f708bc509c927ffdc622ba46315121c7041c3 00110056 1 12/65 2014-07-01 19:08:49 10:134:22:35:03
key image 02: b915300390b547f51538a867ffca3594bd7bc79526b394519f54d794347ef542 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b1c43b800dc3229ca9e995576f4f3b9e1ea4428d31cbb00542d3e94038e09895 00113572 1 15/61 2014-07-04 06:06:00 10:132:11:37:52
key image 03: 6c6561e73421b3911bf398cb120078367096b6ded43ab2f5574c05e3ebc42ae9 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0a2a383b95ea09ab94eeae20be21b583d3dc7c1cadbbc9c0bb639f16f243046e 00104261 1 24/71 2014-06-27 19:33:19 10:138:22:10:33
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 43494697, "key_offsets": [ 0 ], "k_image": "d1c71792efeca717ff598f727ada1b4ac3c206782b5b1b8a65a67f841349b195" } }, { "key": { "amount": 500000000000, "key_offsets": [ 81080 ], "k_image": "82be696664c6ae7cf3f90e61fa27fd1cf42a7909602bd9ade6104bece71baf4f" } }, { "key": { "amount": 500000000000, "key_offsets": [ 88375 ], "k_image": "b915300390b547f51538a867ffca3594bd7bc79526b394519f54d794347ef542" } }, { "key": { "amount": 500000000000, "key_offsets": [ 64717 ], "k_image": "6c6561e73421b3911bf398cb120078367096b6ded43ab2f5574c05e3ebc42ae9" } } ], "vout": [ { "amount": 5000000000, "target": { "key": "6832d11cc85535aa6f35fc042f5f6385b7d0d6c326b470cfe6c3ed1ea901431b" } }, { "amount": 90000000000, "target": { "key": "2bac67660bfa434994749c23c9e4811ccf4660262d7feb927c7578bd1d2bebb1" } }, { "amount": 400000000000, "target": { "key": "f4058382d5159714aca94235b64480671a6192335305b632586d0a39ddf5c64b" } }, { "amount": 1000000000000, "target": { "key": "fd359472e15097660ad9c5ce314ecc2fbdca40315aa1d0a4042c887880877b06" } } ], "extra": [ 2, 33, 0, 96, 192, 252, 143, 252, 201, 12, 117, 218, 104, 56, 232, 104, 57, 8, 212, 232, 134, 144, 139, 107, 187, 98, 242, 149, 23, 2, 4, 193, 62, 246, 38, 1, 176, 196, 148, 219, 117, 40, 70, 35, 195, 17, 61, 11, 20, 73, 209, 129, 69, 17, 184, 122, 108, 163, 89, 181, 190, 169, 230, 20, 17, 165, 228, 158 ], "signatures": [ "4fef73ae417160c7754876ea8c510c95546d4a39d7234a8540d4cc8279874902dcaa445178dbe3978331abab863e617ba353a798e85390d4c0aa5e2d162c890d", "d0558127444e1cdbca4406ee736706f786a36d8dfacbe7375e5d8d1ea7da630c54b1426b21d6019a9439757cd613dbfad6ebb93331e935ff5c0e9364147e0104", "a503f145d9cb3c4ca449e5ff9e0a0f05f5365999b6761eb79db114626e1e4206c2c60ce2e601a827f1291cd098eebda363fc768dd9fd5745c0c72a6a657f9a0d", "0d05f2ac4673b81ec1158ca601df082a9f16145fd4ee8fcb551b30e0b5e5ac0eb14a4c41ffcc79cf419e10ad287ae9e67be019c7fc6ab110ef068a3ade950e00"] }


Less details
source code | moneroexplorer