Monero Transaction b0abf8e04c13a0778b8600709c86da0e36a8fc45b9247dad190015379dfb3182

Autorefresh is OFF

Tx hash: b0abf8e04c13a0778b8600709c86da0e36a8fc45b9247dad190015379dfb3182

Tx prefix hash: 86ff30871e5b097792b48795b9c676b32ab36966c20a2ae82c496c8e87c67dc6
Tx public key: ff97c1928b7879a09719e38ddf5311fcaf587befa18b0971c3023a80cc77d64d
Payment id: f23c7b6d941b4c2b948dcf583c33097ea43b82aedc1f49ee89e1b6a9e68e54c3

Transaction b0abf8e04c13a0778b8600709c86da0e36a8fc45b9247dad190015379dfb3182 was carried out on the Monero network on 2014-08-03 13:14:41. The transaction has 3135378 confirmations. Total output fee is 0.009580000000 XMR.

Timestamp: 1407071681 Timestamp [UTC]: 2014-08-03 13:14:41 Age [y:d:h:m:s]: 10:121:20:23:35
Block: 157270 Fee (per_kB): 0.009580000000 (0.011109762174) Tx size: 0.8623 kB
Tx version: 1 No of confirmations: 3135378 RingCT/type: no
Extra: 022100f23c7b6d941b4c2b948dcf583c33097ea43b82aedc1f49ee89e1b6a9e68e54c301ff97c1928b7879a09719e38ddf5311fcaf587befa18b0971c3023a80cc77d64d

7 output(s) for total of 100.880420000000 xmr

stealth address amount amount idx tag
00: 1a60d3d01ba3343b7656054cc336b1a72b4625efbac4ad056ac25403de91f3d9 0.000420000000 2221 of 2232 -
01: f9d5e3c31c4bdaac91ab305be84d1f327763c93f2e97dcc9f977fbd46b4942e7 0.010000000000 323740 of 502466 -
02: a532511066f6a84a9377f6edb909e8d71eb7fe7db2a680ae0b5a3254678dce31 0.070000000000 91085 of 263947 -
03: c6f054d201a72c7089ecb9f3c7aa2e484be657b75d1a01cff0d117825d70b9fb 0.800000000000 97277 of 489955 -
04: 6c7f9f2627ef0b32cde5da2897914ceece5d54acffed255ed60ebbbf6a59a62a 2.000000000000 63519 of 434057 -
05: 2edfb92c7d783194b1fa589429697dfffb98b5921eb79a2dada11f1404608a9a 8.000000000000 12309 of 226902 -
06: 237bb5ca508be212f6824c8d501e0e29d57ddc182dede06cd02a98a17151dff9 90.000000000000 2811 of 36286 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-16 10:21:38 till 2014-07-25 06:51:03; resolution: 0.05 days)

  • |______________________________________________________________________________*___________________________________________________________________________________________|
  • |_______________________________________________________________________________________*__________________________________________________________________________________|
  • |_____________________________________*____________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_*________________________________________________________________________________________________________________________________________________________________________|

5 inputs(s) for total of 100.890000000000 xmr

key image 00: 22e2b918396c66a706faa03cd74a60c1b9df25d7f53a6116d40c5cadb6310afb amount: 0.800000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8806b9225fa35dd49603a497d5f9bc325c6f769d34d782ad7338ae26743f887d 00136964 1 1/10 2014-07-20 11:15:16 10:135:22:23:00
key image 01: 3194a61ca4a93ad695d48d939c026d3a39dbd9e82794927bf6747b47db32004b amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8d2a8068606f830eb955aa78ec8b1d1cc4ec12fe3ea3b889ab4db805173d5348 00137630 1 3/9 2014-07-20 22:30:37 10:135:11:07:39
key image 02: 1cbf821061711973941ac6ba3334f961deeb23a39490880347adeba591c0ac8b amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 62caa3457b9c328c3c9aff761f7080770dd2d984e6434f1a1438bbf8d7863c9f 00133903 1 1/10 2014-07-18 08:02:28 10:138:01:35:48
key image 03: 524b428848335e073410b412a441369d50f4a5a1c64edba5e85f048fa9bd615c amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: cdac6d877d5e28735235b2ef1ca4e07d4a68e4ce7302ecb578d212d935a01a1d 00143840 1 4/10 2014-07-25 05:51:03 10:131:03:47:13
key image 04: 9ca26c245b4a783de73688e5d8730b71105448082a1331df1a13ec37829209ab amount: 90.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3ecd6b84547dcf374089ed010ee7f4ec4ba1e58ae01618b1cebdc7740339a37c 00131105 1 3/1 2014-07-16 11:21:38 10:139:22:16:38
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 800000000000, "key_offsets": [ 74504 ], "k_image": "22e2b918396c66a706faa03cd74a60c1b9df25d7f53a6116d40c5cadb6310afb" } }, { "key": { "amount": 90000000000, "key_offsets": [ 85433 ], "k_image": "3194a61ca4a93ad695d48d939c026d3a39dbd9e82794927bf6747b47db32004b" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 58699 ], "k_image": "1cbf821061711973941ac6ba3334f961deeb23a39490880347adeba591c0ac8b" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 70602 ], "k_image": "524b428848335e073410b412a441369d50f4a5a1c64edba5e85f048fa9bd615c" } }, { "key": { "amount": 90000000000000, "key_offsets": [ 2005 ], "k_image": "9ca26c245b4a783de73688e5d8730b71105448082a1331df1a13ec37829209ab" } } ], "vout": [ { "amount": 420000000, "target": { "key": "1a60d3d01ba3343b7656054cc336b1a72b4625efbac4ad056ac25403de91f3d9" } }, { "amount": 10000000000, "target": { "key": "f9d5e3c31c4bdaac91ab305be84d1f327763c93f2e97dcc9f977fbd46b4942e7" } }, { "amount": 70000000000, "target": { "key": "a532511066f6a84a9377f6edb909e8d71eb7fe7db2a680ae0b5a3254678dce31" } }, { "amount": 800000000000, "target": { "key": "c6f054d201a72c7089ecb9f3c7aa2e484be657b75d1a01cff0d117825d70b9fb" } }, { "amount": 2000000000000, "target": { "key": "6c7f9f2627ef0b32cde5da2897914ceece5d54acffed255ed60ebbbf6a59a62a" } }, { "amount": 8000000000000, "target": { "key": "2edfb92c7d783194b1fa589429697dfffb98b5921eb79a2dada11f1404608a9a" } }, { "amount": 90000000000000, "target": { "key": "237bb5ca508be212f6824c8d501e0e29d57ddc182dede06cd02a98a17151dff9" } } ], "extra": [ 2, 33, 0, 242, 60, 123, 109, 148, 27, 76, 43, 148, 141, 207, 88, 60, 51, 9, 126, 164, 59, 130, 174, 220, 31, 73, 238, 137, 225, 182, 169, 230, 142, 84, 195, 1, 255, 151, 193, 146, 139, 120, 121, 160, 151, 25, 227, 141, 223, 83, 17, 252, 175, 88, 123, 239, 161, 139, 9, 113, 195, 2, 58, 128, 204, 119, 214, 77 ], "signatures": [ "2d6aaa0e6ed7b2ccf89d25b89136fc6426e4469965b0aec7dd8a37531bc8430b7a703ca8cdcb7fda9ad91e4c26183573bfbd0f7e795359ee69e353591211e007", "0f000716bad3553ce69813110ce39d7655f8a348853dade8a9b98575b062d403bb863b2dab55e44a6d99c89f7151e9ce0ffb716e688fe663580d23c8c8bf2f09", "0511b87f84463c877dfb3aa1b152a08b8208021eea03194a2e580096030dbd01a693fca82e4a3a1fcc09f9f385d8f2a057842738192085b7706a0c9d26482406", "575dbd393ac400f36db955421d9be87072a254e0482a15196e9654322fc84f0e5d65eb0680423a128d0dcc3d66e7267e917f7a128050e25d53bc887b1d153f02", "eeccf30c8bc691df2476f45936d9873343f11f4cb7b5b72ae79c83b271f9f402e14512a90e324da8eff46defc65b3b48ee073ffad246765875e33d0dc359d806"] }


Less details
source code | moneroexplorer