Monero Transaction b2ca5fe8ddeb1fb3d4d6811ad7c25291939e94b73a18b596461e1af3e436760d

Autorefresh is OFF

Tx hash: b2ca5fe8ddeb1fb3d4d6811ad7c25291939e94b73a18b596461e1af3e436760d

Tx prefix hash: bb1a6a1eb2e489e48952f807a101c4100ed3d0da36f7359a07b79829c30478bf
Tx public key: b62f627e5cb7c2f25b8730b0dfc434a7c536eb08be9e967e993dad23b43b2113
Payment id: eb385c71818382adbf2c5ea2d26195506a1831e34890f6b9ef1f87bffacf707d

Transaction b2ca5fe8ddeb1fb3d4d6811ad7c25291939e94b73a18b596461e1af3e436760d was carried out on the Monero network on 2016-12-22 20:47:45. The transaction has 2099822 confirmations. Total output fee is 0.002000000000 XMR.

Timestamp: 1482439665 Timestamp [UTC]: 2016-12-22 20:47:45 Age [y:d:h:m:s]: 07:364:15:10:16
Block: 1207218 Fee (per_kB): 0.002000000000 (0.003195007800) Tx size: 0.6260 kB
Tx version: 1 No of confirmations: 2099822 RingCT/type: no
Extra: 022100eb385c71818382adbf2c5ea2d26195506a1831e34890f6b9ef1f87bffacf707d01b62f627e5cb7c2f25b8730b0dfc434a7c536eb08be9e967e993dad23b43b2113

5 output(s) for total of 19.998000000000 xmr

stealth address amount amount idx tag
00: ba8a549192296a8bfb807a519413c35d6adc38ffebf4c6c15099fc39f2f2e1cb 0.008000000000 227716 of 245068 -
01: a21d146e6fbad41f4364a6ae69b60390dbb3cf4754ffff1a54f3972b2a7a7718 0.090000000000 297349 of 317822 -
02: ce2a8ef098f502bd3dcb037ca6fbaa9663f3b38bd231ac65b7126a4c0b7ad8a6 0.900000000000 438308 of 454894 -
03: a57f81564ce3822297747d64980d3387e20687caf999d9b1d83e88604f6b9c06 9.000000000000 254577 of 274259 -
04: f9de3e62a9da2795230ac1d5f61a70b4e3d8e08e56441acc44494b85cae4b277 10.000000000000 915688 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-10-18 20:22:57 till 2016-12-21 02:55:05; resolution: 2.53 days)

  • |_*_____________________________________________________________________________________________________________*________________________________________________*__*_____*|

1 inputs(s) for total of 20.000000000000 xmr

key image 00: 0edcf491a05ab744b0800672a8913b130d23382480868bd7488d4dbf1b6318c3 amount: 20.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 2e7050d0ca2e21789b8df0cf0bfcdc52a90ad0308642aad0e16df6061423ca19 00787950 1 16/6 2015-10-18 21:22:57 09:065:14:35:04
- 01: 348e42d65ebfea135e8c3447a6c0b163256e57bb55ffbbe198eae30681d36b92 01098382 4 20/10 2016-07-24 16:18:33 08:150:19:39:28
- 02: 2d34e9d0fd7f8d1a2c81fa8a6faf541e5a469f60946af80db1132bfed38f3baf 01188094 5 3/7 2016-11-26 09:12:24 08:026:02:45:37
- 03: e3fc74e5af11427ca69f5481947c87636ac412ebd56ae7dffbd7666489417202 01193744 3 80/9 2016-12-04 05:11:06 08:018:06:46:55
- 04: 1f4e24b4218720fc819d9619eda7e17aed04b96e4e61cd2911883caab746d64f 01205906 3 6/10 2016-12-21 01:55:05 08:001:10:02:56
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 20000000000000, "key_offsets": [ 42438, 16092, 14922, 849, 1412 ], "k_image": "0edcf491a05ab744b0800672a8913b130d23382480868bd7488d4dbf1b6318c3" } } ], "vout": [ { "amount": 8000000000, "target": { "key": "ba8a549192296a8bfb807a519413c35d6adc38ffebf4c6c15099fc39f2f2e1cb" } }, { "amount": 90000000000, "target": { "key": "a21d146e6fbad41f4364a6ae69b60390dbb3cf4754ffff1a54f3972b2a7a7718" } }, { "amount": 900000000000, "target": { "key": "ce2a8ef098f502bd3dcb037ca6fbaa9663f3b38bd231ac65b7126a4c0b7ad8a6" } }, { "amount": 9000000000000, "target": { "key": "a57f81564ce3822297747d64980d3387e20687caf999d9b1d83e88604f6b9c06" } }, { "amount": 10000000000000, "target": { "key": "f9de3e62a9da2795230ac1d5f61a70b4e3d8e08e56441acc44494b85cae4b277" } } ], "extra": [ 2, 33, 0, 235, 56, 92, 113, 129, 131, 130, 173, 191, 44, 94, 162, 210, 97, 149, 80, 106, 24, 49, 227, 72, 144, 246, 185, 239, 31, 135, 191, 250, 207, 112, 125, 1, 182, 47, 98, 126, 92, 183, 194, 242, 91, 135, 48, 176, 223, 196, 52, 167, 197, 54, 235, 8, 190, 158, 150, 126, 153, 61, 173, 35, 180, 59, 33, 19 ], "signatures": [ "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"] }


Less details
source code | moneroexplorer