Monero Transaction b6afab14916cf57fae9a0789c0b9ae705432e807d8a42d76b0342d2a6acd4f75

Autorefresh is OFF

Tx hash: 45b5ad9886ecd3de663d6bb7d1b4f3dfcd57a85f26583d20ffc9499ff8ce7441

Tx prefix hash: 4a574fd2e0c3da72c28767d563bad726cc6bf92d40957e5c0d3d66dbf3ac03da
Tx public key: 5844ed8d7479cb896163f4988a54fca65a9bdba08587f7afdcd3a4fbe6f638b8
Payment id (encrypted): 75fa8eac75d58467

Transaction 45b5ad9886ecd3de663d6bb7d1b4f3dfcd57a85f26583d20ffc9499ff8ce7441 was carried out on the Monero network on N/A. The transaction has 0 confirmations. Total output fee is 0.000030740000 XMR.

Timestamp: 0 Timestamp [UTC]: N/A Age [y:d:h:m:s]:
Block: N/A Fee (per_kB): 0.000030740000 (0.000110062098) Tx size: 0.2793 kB
Tx version: 2 No of confirmations: 0 RingCT/type: yes/6
Extra: 015844ed8d7479cb896163f4988a54fca65a9bdba08587f7afdcd3a4fbe6f638b802090175fa8eac75d58467

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: 55971c5e9701b5da3d93008ee5d16dc71ecba0ae53e52923f1a27c7a1f8c6940 ? N/A of 126000260 <d5>
01: 554c10e89efd9a69a3fc9f5afdefd40a28b733525efb6b64b7be2aab3956a963 ? N/A of 126000260 <81>

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2024-08-29 20:27:15 till 2024-11-15 05:21:06; resolution: 0.46 days)

  • |_*___________________________________*___________________________________________________________________*___________*__________________*___*__________________*_*_*_*_*_*|

1 input(s) for total of ? xmr

key image 00: 8daa0bb972b88613e63cdb539c18cf138e8b6c9190778662a51256d837e0aa7b amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6800984099e21a4fe7e5c8cb22d29f5d575a1e2ec387ff17147e5203832ac8c5 03226060 16 2/2 2024-08-29 21:27:15 00:170:17:55:25
- 01: d1da66ef8816d9c2db65e3781ee318b2e41d56a8b64560f9f2d3c7748e51ef28 03237959 16 16/2 2024-09-15 11:54:39 00:154:03:28:01
- 02: 9732f44921e79f052e2e65109296f54eaf653676a1b7fd4c042c8c4b3df83863 03260454 16 1/2 2024-10-16 14:43:29 00:123:00:39:11
- 03: 9e6b2f35bf3fcb2989b04aad246396531bde99c0056bc60da7cf4299fca7bd6a 03264419 16 2/2 2024-10-22 06:45:13 00:117:08:37:28
- 04: 137b44a70ea8ba4b5bb2880ed671d4609b4182c762151dfea7bbe946220cc5d8 03270739 16 1/16 2024-10-30 22:29:49 00:108:16:52:53
- 05: 24f09b543ca3d4a6f3b804b3d82040d2448421e2a0b0d90c79332bde4a7b1026 03271998 16 2/2 2024-11-01 17:28:22 00:106:21:54:20
- 06: 27ab1e68df0fe2586ea5c32422dc30386ea9706e0ca7c952186b44ec750cf643 03278371 16 14/2 2024-11-10 13:59:11 00:098:01:23:31
- 07: 429de3c0a471871ab2baffd6e550b26cb0b56f3a4a73386d7895ba89c90a5972 03279003 16 2/3 2024-11-11 11:49:42 00:097:03:33:01
- 08: 913feef545a5ee8e368a4ef7773d9eff69b5561e13b5fc20c50585f980175643 03279509 16 1/2 2024-11-12 04:53:32 00:096:10:29:11
- 09: 85e201b31cc7c9979186c25cc0e73dbcc9fe995d7d90bb5e494c8c126b880ca3 03280066 16 1/2 2024-11-13 00:04:11 00:095:15:18:32
- 10: 9cedd969a9d9d772f19a642c692279a830b801f06f948b1de41813bee179e84e 03280330 16 2/16 2024-11-13 09:08:32 00:095:06:14:11
- 11: bd6f2354954ebab26b58f0935faf44c5c1c1cc34282bf7fc9104b5bfc1745524 03280974 16 2/2 2024-11-14 05:59:27 00:094:09:23:16
- 12: 71b83fe01a622de157763e91b0c1cc691f24cb8045be25ff2149df4ef67d0ecb 03281644 16 1/2 2024-11-15 03:35:21 00:093:11:47:23
- 13: 876606c9951b1df4d6372c72e59b131d806ea679146d83ddde9805c1303d9564 03281652 16 2/5 2024-11-15 03:59:39 00:093:11:23:06
- 14: 37737aa6eef39bf52e90ef44bba01cc0c9cb7647a43158d8a51e3611cb0c2767 03281658 16 113/2 2024-11-15 04:15:27 00:093:11:07:18
- 15: 505977ce79cfb059ceb83ab5c40a256fcaf57649fc7ff62e2753c21061b83b80 03281661 16 2/2 2024-11-15 04:21:06 00:093:11:01:39
{ "version": 2, "unlock_time": 0, "vin": [ { "key": { "amount": 0, "key_offsets": [ 113465183, 1270967, 2452076, 359513, 570745, 132530, 809937, 68891, 61977, 65688, 25918, 69501, 71916, 877, 749, 232 ], "k_image": "8daa0bb972b88613e63cdb539c18cf138e8b6c9190778662a51256d837e0aa7b" } } ], "vout": [ { "amount": 0, "target": { "tagged_key": { "key": "55971c5e9701b5da3d93008ee5d16dc71ecba0ae53e52923f1a27c7a1f8c6940", "view_tag": "d5" } } }, { "amount": 0, "target": { "tagged_key": { "key": "554c10e89efd9a69a3fc9f5afdefd40a28b733525efb6b64b7be2aab3956a963", "view_tag": "81" } } } ], "extra": [ 1, 88, 68, 237, 141, 116, 121, 203, 137, 97, 99, 244, 152, 138, 84, 252, 166, 90, 155, 219, 160, 133, 135, 247, 175, 220, 211, 164, 251, 230, 246, 56, 184, 2, 9, 1, 117, 250, 142, 172, 117, 213, 132, 103 ], "rct_signatures": { "type": 6, "txnFee": 30740000, "ecdhInfo": [ { "trunc_amount": "b922896fb7a29b23" }, { "trunc_amount": "551aea90400147e8" }], "outPk": [ "80cbc8321a674c66f9e9b5677208ea5e5858b5debf82ebe7857ca37cbf42faf4", "aab1c32095b66c1641368cf5f41c01c577518d03813e4c25ffb375d5d5f2f3af"] } }


Less details
source code | moneroexplorer