Monero Transaction a80494de5bb68bc6e0618afba5abd5fa0de9f0ac3b5cf88e21ce571d74f1d350

Autorefresh is OFF

Tx hash: a80494de5bb68bc6e0618afba5abd5fa0de9f0ac3b5cf88e21ce571d74f1d350

Tx prefix hash: 41e197cf3294a73a02a2b9f3e19597c3448c71c6491b33e7639568a0598a5fa4
Tx public key: e168caaa0511eb69ad125e86d8d2093a194d212999659aa54476d3ca51f91859
Payment id: 1349006ab093bc3ac02c03475c22110123eeee79e48bede819c2af8ddd4024a1

Transaction a80494de5bb68bc6e0618afba5abd5fa0de9f0ac3b5cf88e21ce571d74f1d350 was carried out on the Monero network on 2014-08-05 02:46:40. The transaction has 3134243 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1407206800 Timestamp [UTC]: 2014-08-05 02:46:40 Age [y:d:h:m:s]: 10:121:18:28:01
Block: 159476 Fee (per_kB): 0.005000000000 (0.009326047359) Tx size: 0.5361 kB
Tx version: 1 No of confirmations: 3134243 RingCT/type: no
Extra: 0221001349006ab093bc3ac02c03475c22110123eeee79e48bede819c2af8ddd4024a101e168caaa0511eb69ad125e86d8d2093a194d212999659aa54476d3ca51f91859

4 output(s) for total of 1.295000000000 xmr

stealth address amount amount idx tag
00: 3fb67b5421f6271c42879a4d6c54ca8374264c8e2dbea4fd94d884f725c4d097 0.005000000000 202817 of 308585 -
01: d70bb2e6531280e1a5188ef39d570064bc4b9fc5ef4fe0f9f3706eea3a0778ed 0.090000000000 98009 of 317822 -
02: c1810f5a040ac65ee9da2ee8976ae5357c8b22654176cc69d4c40f94543d8f57 0.200000000000 320051 of 1272210 -
03: 17e51961656ddc9891a2edebea92a89ee37e5d6d7aa545bb1e16841e404d63e5 1.000000000000 166433 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-08-04 13:40:57 till 2014-08-05 01:30:35; resolution: 0.00 days)

  • |____________________________________________________________*_____________________________________________________________________________________________________________|
  • |___________________________________________________________________________________________________________________________________________________________*______________|
  • |_______________*__________________________________________________________________________________________________________________________________________________________|

3 inputs(s) for total of 1.300000000000 xmr

key image 00: f74018095ed5b5cace5915780725759323318df1a2e88ea364388c9a283b996d amount: 0.600000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d1b2bbb0feb1fd7f78d04f4dc7b62b07dd6f548125c2226d0bb981abd3709af1 00158992 1 4/28 2014-08-04 17:52:04 10:122:03:22:37
key image 01: 8fca6a0cd9339917780c63a607403ab79532ebf0e0b4d53cd0884040f49ef3b5 amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: bb9961f627d307b27d1bd68490cdc6b6b904db38eae023614cb8c60c6bdbe268 00159339 1 27/66 2014-08-05 00:30:35 10:121:20:44:06
key image 02: 947f5edcf00d407516e6ee3d42875b7ce65bd937e99e282ec6c1ab2658d211cf amount: 0.600000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9822768350c9b47367c8c35b3911adf6ed872d8fe9009bbb43d1070726a26d15 00158795 1 3/33 2014-08-04 14:40:57 10:122:06:33:44
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 600000000000, "key_offsets": [ 130374 ], "k_image": "f74018095ed5b5cace5915780725759323318df1a2e88ea364388c9a283b996d" } }, { "key": { "amount": 100000000000, "key_offsets": [ 372833 ], "k_image": "8fca6a0cd9339917780c63a607403ab79532ebf0e0b4d53cd0884040f49ef3b5" } }, { "key": { "amount": 600000000000, "key_offsets": [ 130068 ], "k_image": "947f5edcf00d407516e6ee3d42875b7ce65bd937e99e282ec6c1ab2658d211cf" } } ], "vout": [ { "amount": 5000000000, "target": { "key": "3fb67b5421f6271c42879a4d6c54ca8374264c8e2dbea4fd94d884f725c4d097" } }, { "amount": 90000000000, "target": { "key": "d70bb2e6531280e1a5188ef39d570064bc4b9fc5ef4fe0f9f3706eea3a0778ed" } }, { "amount": 200000000000, "target": { "key": "c1810f5a040ac65ee9da2ee8976ae5357c8b22654176cc69d4c40f94543d8f57" } }, { "amount": 1000000000000, "target": { "key": "17e51961656ddc9891a2edebea92a89ee37e5d6d7aa545bb1e16841e404d63e5" } } ], "extra": [ 2, 33, 0, 19, 73, 0, 106, 176, 147, 188, 58, 192, 44, 3, 71, 92, 34, 17, 1, 35, 238, 238, 121, 228, 139, 237, 232, 25, 194, 175, 141, 221, 64, 36, 161, 1, 225, 104, 202, 170, 5, 17, 235, 105, 173, 18, 94, 134, 216, 210, 9, 58, 25, 77, 33, 41, 153, 101, 154, 165, 68, 118, 211, 202, 81, 249, 24, 89 ], "signatures": [ "fc2724c417af20c49cd5ed60ae4114bb93c29066f2049438837068af38f6060d2fffa8feba3278122e7fac5aa81c81565821fd2521b640a520dda052bc8eb70e", "e27bf4ca3d0b2edb4479a6d4d466f5e0e5189dc0766dafa4a58ca4bfd0d82004c75bdf4c604574a3d7af6e5a20eef413216f0a19c0b9b3c01623527063c6af02", "11f174ca77f135010d2dad1a29db42f8c281a92df2bd087bd5838fff4372cc02ad2b566282ee4b80bc72da914d53a37a49442eeee0189a405a5731562274b501"] }


Less details
source code | moneroexplorer