Monero Transaction b45ba983e45e49534d6739bf44708de75c572495601c3a7999c0a4bc52f75999

Autorefresh is OFF

Tx hash: b45ba983e45e49534d6739bf44708de75c572495601c3a7999c0a4bc52f75999

Tx prefix hash: 337754929ed07d28371f8f72e78a661ce1803a1bb1ada8f451d49bef7a9ccb6c
Tx public key: b214d86ebcb842c454de66338051d91ee8c1d11ce766e0ea2ced74189010021f
Payment id: 3c87a4ca57abfdd4de498d31bb3969e1e7934560b96f3205e138ff27b1c5ef8e

Transaction b45ba983e45e49534d6739bf44708de75c572495601c3a7999c0a4bc52f75999 was carried out on the Monero network on 2014-06-30 14:32:28. The transaction has 3170152 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1404138748 Timestamp [UTC]: 2014-06-30 14:32:28 Age [y:d:h:m:s]: 10:136:01:45:17
Block: 108292 Fee (per_kB): 0.010000000000 (0.015585996956) Tx size: 0.6416 kB
Tx version: 1 No of confirmations: 3170152 RingCT/type: no
Extra: 0221003c87a4ca57abfdd4de498d31bb3969e1e7934560b96f3205e138ff27b1c5ef8e01b214d86ebcb842c454de66338051d91ee8c1d11ce766e0ea2ced74189010021f

4 output(s) for total of 1.270000000000 xmr

stealth address amount amount idx tag
00: 37e3e141d84116dc7b351f9028d89573c61cf71274abfbc367093a2eecdb4d48 0.070000000000 78572 of 263947 -
01: f2b252cf1018682e399b9c373233b4ba22db21c3483342e845e76b8628cfe1c1 0.100000000000 211280 of 982315 -
02: 5138dee3243a0aa8405ec65dd25bb67c6b17112926694ab48635f452f77147a9 0.100000000000 211281 of 982315 -
03: c92ce3eb689cde8ae43d787cded67397519aa0690b82755aadcc4b3e319139e3 1.000000000000 59960 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-30 11:07:31 till 2014-06-30 15:04:05; resolution: 0.00 days)

  • |_______________________________________________________________________________________________________________________________*__________________________________________|
  • |____________________________________________________________________________________________________*_____________________________________________________________________|
  • |____________________________________________________________________________________________________*_____________________________________________________________________|
  • |___________________________________________*______________________________________________________________________________________________________________________________|

4 inputs(s) for total of 1.280000000000 xmr

key image 00: 9f2feda97861af8be2e01a725e806083cc029552f803d4e0fab13d8fa6d6abf4 amount: 0.600000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 78d7efd1a601dd5654a11d50cf01557784369c5212f8fb077b9f88e1d89dc951 00108264 1 10/63 2014-06-30 14:04:05 10:136:02:13:40
key image 01: 975b1f2a96cb5bac425ff6ec4560243745f5cff4bf09bc74e23e34c8ff9443ef amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a11fc607bbdb392f3cc3a420db627a729660467bf9eca9bd42d73c48854ec89a 00108227 1 4/4 2014-06-30 13:26:30 10:136:02:51:15
key image 02: 3d4cdf5e4cd787d5f32f8ad4b0a3d90486a59dc786d412ed44eac8b061481ba6 amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0f0790a1ae75af87f313759a079ff76f05ddba58ade8e4df52998b3ba3ab5ecb 00108227 1 5/4 2014-06-30 13:26:30 10:136:02:51:15
key image 03: 4746c44d02d1899692f7ef5329f3686d61e80298c486b01579feef2918d54939 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3e3bf962ef4777be09af85ea203b799bf859e614f430f5487e8d183d8f2a709d 00108135 1 23/64 2014-06-30 12:07:31 10:136:04:10:14
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 600000000000, "key_offsets": [ 46086 ], "k_image": "9f2feda97861af8be2e01a725e806083cc029552f803d4e0fab13d8fa6d6abf4" } }, { "key": { "amount": 90000000000, "key_offsets": [ 70844 ], "k_image": "975b1f2a96cb5bac425ff6ec4560243745f5cff4bf09bc74e23e34c8ff9443ef" } }, { "key": { "amount": 90000000000, "key_offsets": [ 70843 ], "k_image": "3d4cdf5e4cd787d5f32f8ad4b0a3d90486a59dc786d412ed44eac8b061481ba6" } }, { "key": { "amount": 500000000000, "key_offsets": [ 76465 ], "k_image": "4746c44d02d1899692f7ef5329f3686d61e80298c486b01579feef2918d54939" } } ], "vout": [ { "amount": 70000000000, "target": { "key": "37e3e141d84116dc7b351f9028d89573c61cf71274abfbc367093a2eecdb4d48" } }, { "amount": 100000000000, "target": { "key": "f2b252cf1018682e399b9c373233b4ba22db21c3483342e845e76b8628cfe1c1" } }, { "amount": 100000000000, "target": { "key": "5138dee3243a0aa8405ec65dd25bb67c6b17112926694ab48635f452f77147a9" } }, { "amount": 1000000000000, "target": { "key": "c92ce3eb689cde8ae43d787cded67397519aa0690b82755aadcc4b3e319139e3" } } ], "extra": [ 2, 33, 0, 60, 135, 164, 202, 87, 171, 253, 212, 222, 73, 141, 49, 187, 57, 105, 225, 231, 147, 69, 96, 185, 111, 50, 5, 225, 56, 255, 39, 177, 197, 239, 142, 1, 178, 20, 216, 110, 188, 184, 66, 196, 84, 222, 102, 51, 128, 81, 217, 30, 232, 193, 209, 28, 231, 102, 224, 234, 44, 237, 116, 24, 144, 16, 2, 31 ], "signatures": [ "c245a29298f9fa3be8b2ffb382ee880942972f143afcfe4ba7bb47833eb59a03d5f31c5c669d3c1135d38e1f60cbf9f6c43ab17cc34fe271bc65182cb741880c", "fbc96154f32a920985d71aa53306a9759ab74e1d8d79b7cc96fc17e0325c6c066e121c6dc8ea30a4c9096b0b182441d2ced935fc9f15ff9e9bdcd6c84218bf06", "51f52d947a6618f7697a767c789b9db87d2871cf533112e9b234bebe5e4667094fe4ad77311a48ed78e136bbd81eac9889b5189bae0a276b33ca13722c4e720c", "d19b62e27fd229b190714ec4948f26d78531c1d30c8909735d21bc51cd245c06b75813a74464bb8c9ec5e2727908786cfab7e54d2c6952a6060bbbccafc31707"] }


Less details
source code | moneroexplorer