Monero Transaction b081b4bae920c2e484910ea030268ca241a8922eb34cb06c2ad5c9f26faca692

Autorefresh is OFF

Tx hash: b081b4bae920c2e484910ea030268ca241a8922eb34cb06c2ad5c9f26faca692

Tx prefix hash: 6a344c7ae29231fc2643ce292d3066b108d4d9cac0024e7fda2073e3020cd7d0
Tx public key: b275b7e3420df5900e3d05ada85d6038dc49c9721958892e5b362d5c12a4998b
Payment id: f667fba8882ac0e7fc8b4b39fa7dad994013ccb44ef0fe8ea0aebd7a8f82c2c0

Transaction b081b4bae920c2e484910ea030268ca241a8922eb34cb06c2ad5c9f26faca692 was carried out on the Monero network on 2014-08-28 19:18:13. The transaction has 3110463 confirmations. Total output fee is 0.138924805491 XMR.

Timestamp: 1409253493 Timestamp [UTC]: 2014-08-28 19:18:13 Age [y:d:h:m:s]: 10:112:11:09:12
Block: 193511 Fee (per_kB): 0.138924805491 (0.379357335527) Tx size: 0.3662 kB
Tx version: 1 No of confirmations: 3110463 RingCT/type: no
Extra: 022100f667fba8882ac0e7fc8b4b39fa7dad994013ccb44ef0fe8ea0aebd7a8f82c2c001b275b7e3420df5900e3d05ada85d6038dc49c9721958892e5b362d5c12a4998b

5 output(s) for total of 3.861075194509 xmr

stealth address amount amount idx tag
00: 06eb66cd1f628073e9f6d02e9046ca1d391331ce7230657ab779a219af2f870a 0.061075194509 0 of 1 -
01: be8e04a2e59c61b52baaba08ba02c56909b02c8cd9fc9d1eadbed289f96f439a 0.100000000000 484507 of 982315 -
02: dcc4a9a8259db689b75479ff2201de0ffcf4ec50425fdb3e9755597d3b133275 0.700000000000 129049 of 514467 -
03: d16e4e9242a4deaa8628ddba903010bdff29c17ebc0ae214d700e0cad4926836 1.000000000000 222488 of 874630 -
04: 375b368d160a920cfa53150dd01f02591c18a6da43f0997f4d2ae30f287a437a 2.000000000000 86471 of 434058 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-08-28 15:26:13 till 2014-08-28 17:26:13; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|

1 inputs(s) for total of 4.000000000000 xmr

key image 00: e0438ebf828ca04b4663933b4e96d4a11c3d8f4d69a86a31405aeb61dbdff77b amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d487f886c3716e0af1211441830284f2896e31604af7ce10146e6351a3e87638 00193379 1 8/3 2014-08-28 16:26:13 10:112:14:01:12
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 4000000000000, "key_offsets": [ 63989 ], "k_image": "e0438ebf828ca04b4663933b4e96d4a11c3d8f4d69a86a31405aeb61dbdff77b" } } ], "vout": [ { "amount": 61075194509, "target": { "key": "06eb66cd1f628073e9f6d02e9046ca1d391331ce7230657ab779a219af2f870a" } }, { "amount": 100000000000, "target": { "key": "be8e04a2e59c61b52baaba08ba02c56909b02c8cd9fc9d1eadbed289f96f439a" } }, { "amount": 700000000000, "target": { "key": "dcc4a9a8259db689b75479ff2201de0ffcf4ec50425fdb3e9755597d3b133275" } }, { "amount": 1000000000000, "target": { "key": "d16e4e9242a4deaa8628ddba903010bdff29c17ebc0ae214d700e0cad4926836" } }, { "amount": 2000000000000, "target": { "key": "375b368d160a920cfa53150dd01f02591c18a6da43f0997f4d2ae30f287a437a" } } ], "extra": [ 2, 33, 0, 246, 103, 251, 168, 136, 42, 192, 231, 252, 139, 75, 57, 250, 125, 173, 153, 64, 19, 204, 180, 78, 240, 254, 142, 160, 174, 189, 122, 143, 130, 194, 192, 1, 178, 117, 183, 227, 66, 13, 245, 144, 14, 61, 5, 173, 168, 93, 96, 56, 220, 73, 201, 114, 25, 88, 137, 46, 91, 54, 45, 92, 18, 164, 153, 139 ], "signatures": [ "b4f6b6c6b4cafe7c4051d3f0118c68dae91a2283f8ee67f224539948c7e6030b56a4f427fba68e3f25368d7151a2eab7bb5bb393741cf303f40d087bf8d37b07"] }


Less details
source code | moneroexplorer