Monero Transaction abaf55bb5a8094ddc55487ef6a22b0bc88bf6741fbacf29e6e58816d33d28ded

Autorefresh is OFF

Tx hash: 060fb611e3796992b3f2a373a2c35dc12bcf944e15a915ca42cdc407784be368

Tx prefix hash: b1f9d9e1fa0d2c1720de8c44ec16e130f3c93828bdf148482ac9ad493e5f7700
Tx public key: 5776cfe744f812148a572bf74d75421829a2bd0f38dba25924001bfd17b12fb2
Payment id (encrypted): 9da05cfb47fa91d1

Transaction 060fb611e3796992b3f2a373a2c35dc12bcf944e15a915ca42cdc407784be368 was carried out on the Monero network on N/A. The transaction has 0 confirmations. Total output fee is 0.000491200000 XMR.

Timestamp: 0 Timestamp [UTC]: N/A Age [y:d:h:m:s]:
Block: N/A Fee (per_kB): 0.000491200000 (0.001771087324) Tx size: 0.2773 kB
Tx version: 2 No of confirmations: 0 RingCT/type: yes/6
Extra: 015776cfe744f812148a572bf74d75421829a2bd0f38dba25924001bfd17b12fb20209019da05cfb47fa91d1

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: 743d5b9d2329c7f40eb34540c8b827fc4886e2d34b237c218a94775c0d3d6985 ? N/A of 120126672 <4d>
01: dd0ee26b63973ccd41ec4cac76f96d8dab548d8f832395a33faadbae74334b6a ? N/A of 120126672 <ad>

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2024-10-15 22:43:56 till 2024-11-14 14:31:12; resolution: 0.17 days)

  • |_*_________________________________________*______________________________________________________________________*__________________*__________________*__*__*____***_*_*|

1 input(s) for total of ? xmr

key image 00: 2fde6e3d2f9cc93f9e8e2ce8dcb7d3968be942c8873bc9b5d4ccc18448a0fe54 amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e6b04eee208a8d87d6a476df76fdcffa2d9312917ce6a324a38637cd92861a75 03259973 16 2/6 2024-10-15 23:43:56 00:040:00:14:24
- 01: 5f72754cdac614daaadcef637554f30ebd8d27bc91f341c6b209cfd2e0cf9f67 03265189 16 1/16 2024-10-23 08:02:01 00:032:15:56:19
- 02: d471bda664c419d4a78d6d004577afe4e56bb9121384cb6286c641ecf92949cb 03274245 16 1/16 2024-11-04 19:16:18 00:020:04:42:02
- 03: e91226eb597662b75a053685ce29e5b8a262b23fde94d0aaecd2a274c1f978c3 03276656 16 2/2 2024-11-08 04:53:03 00:016:19:05:17
- 04: e69ed80b0bd045b4986e76b99868e056f21594ebc764b0fb709d8ded77ad9297 03278980 16 1/2 2024-11-11 10:48:06 00:013:13:10:14
- 05: a66529c09b11f87bc17d3669e51c6154e7f233e62fce28175acef9be174ed949 03279406 16 2/2 2024-11-12 01:08:36 00:012:22:49:44
- 06: 11a68f5e4e18979b27a38bab5b1214af09b8cc0cd599d75a584e14217a7a946a 03279813 16 1/10 2024-11-12 15:52:41 00:012:08:05:39
- 07: 10adf8f9bf179a80d51f2bc43155dfc3ae1f8b3738c1d562944cea428d83f68d 03280390 16 1/16 2024-11-13 11:11:03 00:011:12:47:17
- 08: 5150c1dd362a1516c41468876eddd7a1fb2089631f8e37ff887a796b9452ae6d 03280514 16 2/16 2024-11-13 14:29:15 00:011:09:29:05
- 09: 789d04eb53a6b50c993679b7bf57065f771ff695a4a8b954f5063ceea60d0676 03280674 16 1/2 2024-11-13 19:21:57 00:011:04:36:23
- 10: e3d4dfd24f100178c400b7e0f3d48ad4db910ae042757e6a3d43901c5baddf64 03280688 16 1/2 2024-11-13 19:47:28 00:011:04:10:52
- 11: ff22d26f8e2611cc37796147516ec62e4111beaecd4e5ed542bb7479517ebb0f 03280725 16 1/2 2024-11-13 21:11:39 00:011:02:46:41
- 12: 8c0c06d8a9120efc496a201a9e2e6b588798ba655b75ad3dd3c05c7387fccd42 03280897 16 1/4 2024-11-14 03:06:01 00:010:20:52:19
- 13: 57a854bb6a117974f8cb59cc8c28fd70aeeb3c28614e2ae4b1dbfb8b1c9b21ad 03280962 16 1/2 2024-11-14 05:38:00 00:010:18:20:20
- 14: 29a6516932a1ceee33ee7c7727a338fa8ea1a9c93f1bf49f5a7fe3080aaf4589 03281167 0 0/24 2024-11-14 11:46:11 00:010:12:12:09
- 15: 4ead544cd731ae137d3b3b49c7edfc3b4e6b651b134732bb1d69a45f9415faaa 03281231 16 2/2 2024-11-14 13:31:12 00:010:10:27:08
{ "version": 2, "unlock_time": 0, "vin": [ { "key": { "amount": 0, "key_offsets": [ 117149122, 464129, 874074, 397699, 241221, 54380, 45777, 63800, 12263, 19059, 1322, 5514, 17652, 5970, 19478, 6742 ], "k_image": "2fde6e3d2f9cc93f9e8e2ce8dcb7d3968be942c8873bc9b5d4ccc18448a0fe54" } } ], "vout": [ { "amount": 0, "target": { "tagged_key": { "key": "743d5b9d2329c7f40eb34540c8b827fc4886e2d34b237c218a94775c0d3d6985", "view_tag": "4d" } } }, { "amount": 0, "target": { "tagged_key": { "key": "dd0ee26b63973ccd41ec4cac76f96d8dab548d8f832395a33faadbae74334b6a", "view_tag": "ad" } } } ], "extra": [ 1, 87, 118, 207, 231, 68, 248, 18, 20, 138, 87, 43, 247, 77, 117, 66, 24, 41, 162, 189, 15, 56, 219, 162, 89, 36, 0, 27, 253, 23, 177, 47, 178, 2, 9, 1, 157, 160, 92, 251, 71, 250, 145, 209 ], "rct_signatures": { "type": 6, "txnFee": 491200000, "ecdhInfo": [ { "trunc_amount": "b281f5699821af9d" }, { "trunc_amount": "fd87a8e9de3bf440" }], "outPk": [ "7f7fc95c2a10e536a6e4e7bee2da42891f7adfb7f09cf3985711ec15415215c9", "1e6b44383acef6b7a4e028b1f701491ec3137c644ea300658af24ac3c4500f35"] } }


Less details
source code | moneroexplorer