Monero Transaction b457bf2baf7a269038053f6b5c09ea700c4abfa87e0365f1fe2a6b73b741bc41

Autorefresh is OFF

Tx hash: b457bf2baf7a269038053f6b5c09ea700c4abfa87e0365f1fe2a6b73b741bc41

Tx prefix hash: dca0cc3a0eda6f1ef80aae45c815093a766f8e12554ab42f4639c8244be7f5f6
Tx public key: 181bd34554bddd3be2fa9570296b21af5fcc4c4d8598f81789b57d04f6c9db44

Transaction b457bf2baf7a269038053f6b5c09ea700c4abfa87e0365f1fe2a6b73b741bc41 was carried out on the Monero network on 2015-12-17 02:04:24. The transaction has 2437442 confirmations. Total output fee is 0.012565735829 XMR.

Timestamp: 1450317864 Timestamp [UTC]: 2015-12-17 02:04:24 Age [y:d:h:m:s]: 09:009:07:54:08
Block: 871739 Fee (per_kB): 0.012565735829 (0.018460994963) Tx size: 0.6807 kB
Tx version: 1 No of confirmations: 2437442 RingCT/type: no
Extra: 01181bd34554bddd3be2fa9570296b21af5fcc4c4d8598f81789b57d04f6c9db44

6 output(s) for total of 8.491629840000 xmr

stealth address amount amount idx tag
00: a3be150e8c0bbda69aaf5593dfcac4ae8ef85ae0f97b38839e6e9ed6cc7b6486 0.001629840000 0 of 1 -
01: c72542f28610dc1261e8f9d5078b77d6a2e1aec4e4c2f2be6df92f2ba3c5f609 0.010000000000 414891 of 502466 -
02: e6eebd550883e1cc4911c2c7b0a41d64c85eeac0c0b49b27932e7662e8daae1f 0.080000000000 176200 of 269576 -
03: 310c31e788a27ade33dfb63af91e93114d33d4cc070742d2862baa0d7abc9e60 0.600000000000 520464 of 650760 -
04: 8008a9e564d686b4a4335dc41b55c1ba0dcc22b1350a43b38301e6631f7efcd4 0.800000000000 370497 of 489955 -
05: 8053b8f529a7030ace2b5ba1c10cf0f60ffff4be294204ca19ccad8a95e5954d 7.000000000000 137359 of 285521 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-11-03 13:55:32 till 2015-12-15 15:46:04; resolution: 0.25 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_______________________________________________________________________________________________________________________________________________________________________*__|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |________________________________________________________________________________________________________________________________________________________________*_________|

4 inputs(s) for total of 8.504195575829 xmr

key image 00: 5ddecf9cded77b55317b51db77c1ca6a342e28ec0b8e31bfcaf1cc0ee5c5521d amount: 0.004195575829
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 812f4d61b619d19a405faf1a1dd116a05660490e9dc83fe1c13e2d555998cd40 00810279 0 0/4 2015-11-03 14:55:32 09:052:19:03:00
key image 01: 7836307c260dfd70ea7e5f57ca1d0286696210e765260f254e2c39fe37637b37 amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: da02bd836eddf0ea9417631cacb1f23aaa1bf32b18d0ea05f33a2eb3ed6fb763 00868853 1 4/5 2015-12-15 01:44:30 09:011:08:14:02
key image 02: 0c07a598f95ea2266f7346e4926d5f562fb05074e042910ed5b87a283e77280f amount: 0.600000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e345028643df62bf83a909948d6f8488f39dae29a0c9559fddcb79b142d62fad 00869734 0 0/4 2015-12-15 14:46:04 09:010:19:12:28
key image 03: 866711b596b07943db7720b2def41cde186295e86a464ecb340b06fbf7ad149e amount: 7.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a81a41524efe371032b36e2eae67091849160e5965730774c78b4fc016ce531e 00866478 0 0/4 2015-12-13 08:45:51 09:013:01:12:41
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 4195575829, "key_offsets": [ 0 ], "k_image": "5ddecf9cded77b55317b51db77c1ca6a342e28ec0b8e31bfcaf1cc0ee5c5521d" } }, { "key": { "amount": 900000000000, "key_offsets": [ 323789 ], "k_image": "7836307c260dfd70ea7e5f57ca1d0286696210e765260f254e2c39fe37637b37" } }, { "key": { "amount": 600000000000, "key_offsets": [ 518431 ], "k_image": "0c07a598f95ea2266f7346e4926d5f562fb05074e042910ed5b87a283e77280f" } }, { "key": { "amount": 7000000000000, "key_offsets": [ 131668 ], "k_image": "866711b596b07943db7720b2def41cde186295e86a464ecb340b06fbf7ad149e" } } ], "vout": [ { "amount": 1629840000, "target": { "key": "a3be150e8c0bbda69aaf5593dfcac4ae8ef85ae0f97b38839e6e9ed6cc7b6486" } }, { "amount": 10000000000, "target": { "key": "c72542f28610dc1261e8f9d5078b77d6a2e1aec4e4c2f2be6df92f2ba3c5f609" } }, { "amount": 80000000000, "target": { "key": "e6eebd550883e1cc4911c2c7b0a41d64c85eeac0c0b49b27932e7662e8daae1f" } }, { "amount": 600000000000, "target": { "key": "310c31e788a27ade33dfb63af91e93114d33d4cc070742d2862baa0d7abc9e60" } }, { "amount": 800000000000, "target": { "key": "8008a9e564d686b4a4335dc41b55c1ba0dcc22b1350a43b38301e6631f7efcd4" } }, { "amount": 7000000000000, "target": { "key": "8053b8f529a7030ace2b5ba1c10cf0f60ffff4be294204ca19ccad8a95e5954d" } } ], "extra": [ 1, 24, 27, 211, 69, 84, 189, 221, 59, 226, 250, 149, 112, 41, 107, 33, 175, 95, 204, 76, 77, 133, 152, 248, 23, 137, 181, 125, 4, 246, 201, 219, 68 ], "signatures": [ "57f52b1cfe15a54d76bd18eb594905e11f28e3990ed4e04f1b982f4d3a60b50c6e3e3ca9afad6618c8d7bb26afec6445a4b1f53be17d747690da11f53eb55809", "66143009c08ccd5e9bb20b04bbe8c8ce07f78c52cc2b40e17393db18ea9d280807b29fbd3f37872e67a50fb04e3aa2bcf16323d5c0c7744da05766a74b255909", "f54d5e49b971f0ed86ce390c943b621715104aef37e99105acac256df92fe90bd6fd648291b7a852a301ba112f162602b6441d400d884b58ff8c35d374006706", "85335440df7cbe262eb2116351f10f43c9a5a4731b975dab6c6f988fbf49520259c801914535f5d92f47dc65ab71362c8a7fc811302024d73039323414d68600"] }


Less details
source code | moneroexplorer