Monero Transaction b28e5192fb9435de25c0ef5c135990b1ec6db4cdea55b08811156e0ded993069

Autorefresh is OFF

Tx hash: b28e5192fb9435de25c0ef5c135990b1ec6db4cdea55b08811156e0ded993069

Tx prefix hash: 1a80def7285a1482ba70596d7c974ec73ca00ced896e68a7b859880da51b6683
Tx public key: 3b1f368c0ed5f3d9418859a5ce06e45568ec33619a7edc6e853bf73766a29422

Transaction b28e5192fb9435de25c0ef5c135990b1ec6db4cdea55b08811156e0ded993069 was carried out on the Monero network on 2014-12-13 08:13:09. The transaction has 2950548 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1418458389 Timestamp [UTC]: 2014-12-13 08:13:09 Age [y:d:h:m:s]: 09:360:03:34:30
Block: 345708 Fee (per_kB): 0.100000000000 (0.310303030303) Tx size: 0.3223 kB
Tx version: 1 No of confirmations: 2950548 RingCT/type: no
Extra: 013b1f368c0ed5f3d9418859a5ce06e45568ec33619a7edc6e853bf73766a29422

2 output(s) for total of 0.800000000000 xmr

stealth address amount amount idx tag
00: 71aeba400e5a91ca16fc66dd389030d1482a1fd241c92ee0a4a460d3807c475c 0.200000000000 677744 of 1272210 -
01: b60a1320183aa997e7f0a5f6afe730f1e42a0d3a9ab893e18d71b52b5e052a6a 0.600000000000 305975 of 650760 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-12-10 08:00:19 till 2014-12-10 11:01:09; resolution: 0.00 days)

  • |_________________________________________________________*________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________*________________________________________________________|

2 inputs(s) for total of 0.900000000000 xmr

key image 00: 74098091d7a452145c4cb4da1bb7031800539be79635e03dd624b5fbe1a8b438 amount: 0.400000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 79611ce03e0998ab547a7873fb98c3ef2a3932d4519e21a0b293eb35543501b7 00341456 1 5/52 2014-12-10 09:00:19 09:363:02:47:20
key image 01: 39f67724c8bd83121dd6c6fdc652ea6dc2cf01452a975477d27dd3df7682566a amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e2e9937350c79b05cd72a6a118dc9aaa18cba2ede974c52bee8b994953bea4b7 00341506 1 5/52 2014-12-10 10:01:09 09:363:01:46:30
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 400000000000, "key_offsets": [ 298455 ], "k_image": "74098091d7a452145c4cb4da1bb7031800539be79635e03dd624b5fbe1a8b438" } }, { "key": { "amount": 500000000000, "key_offsets": [ 511060 ], "k_image": "39f67724c8bd83121dd6c6fdc652ea6dc2cf01452a975477d27dd3df7682566a" } } ], "vout": [ { "amount": 200000000000, "target": { "key": "71aeba400e5a91ca16fc66dd389030d1482a1fd241c92ee0a4a460d3807c475c" } }, { "amount": 600000000000, "target": { "key": "b60a1320183aa997e7f0a5f6afe730f1e42a0d3a9ab893e18d71b52b5e052a6a" } } ], "extra": [ 1, 59, 31, 54, 140, 14, 213, 243, 217, 65, 136, 89, 165, 206, 6, 228, 85, 104, 236, 51, 97, 154, 126, 220, 110, 133, 59, 247, 55, 102, 162, 148, 34 ], "signatures": [ "65ea49cf5aac71c044e8484578d9d633605869487d822b34c4684611dca65a0f92392ab0a8f824be7ffe3b4a0af238c7569b592d1a9903e52c659310e8eaa809", "fd931f387fb6712c76a4b057b3ee4052546d82e402525e26a95d47561f8f770eda8ea1377e681a3f45e4dfa8070c2511f63486821b5eee059457028a43408a07"] }


Less details
source code | moneroexplorer