Monero Transaction b80b78126ee33c75620263b374214a679cf08f895a77b85b4307838c86024fb8

Autorefresh is ON (10 s)

Tx hash: b80b78126ee33c75620263b374214a679cf08f895a77b85b4307838c86024fb8

Tx public key: 6b6597aa7f7b8c0be3cdfc68c61cfd1f878c52e8d20c117bf93aeeae814d4493

Transaction b80b78126ee33c75620263b374214a679cf08f895a77b85b4307838c86024fb8 was carried out on the Monero network on 2016-12-03 15:16:16. The transaction has 2107716 confirmations. Total output fee is 0.004000000000 XMR.

Timestamp: 1480778176 Timestamp [UTC]: 2016-12-03 15:16:16 Age [y:d:h:m:s]: 08:010:12:22:03
Block: 1193330 Fee (per_kB): 0.004000000000 (0.002664931685) Tx size: 1.5010 kB
Tx version: 1 No of confirmations: 2107716 RingCT/type: no
Extra: 016b6597aa7f7b8c0be3cdfc68c61cfd1f878c52e8d20c117bf93aeeae814d4493

7 output(s) for total of 2.126000000000 xmr

stealth address amount amount idx tag
00: 3741ca19712b3f19a83bde016cdb98aa8a1ce76d0af0cbf23b83340a4aa17583 0.002000000000 78295 of 95916 -
01: 82acf00316aaf775156915bb3a395ce81b8cce628719dd00d2e25733c33b6d45 0.004000000000 70936 of 89181 -
02: 3dc829bafb55bf11026918962dc7a3bcdbfdcd83f567c86ab3c68dceda5bfc43 0.040000000000 275805 of 294095 -
03: af7d36d640fdaa4f5df2bc3411e7fcdfc192be6a12027fe0670023a612a8fde8 0.080000000000 252079 of 269576 -
04: d733974623638e384cd06ab86c6e9797eb3bd82ddac247e55d2c1dc1da9e3106 0.400000000000 655809 of 688584 -
05: 5990aa8d38fd6847a7e5c1091b4a8884cce3d60133c30a63cb31c4935636de00 0.600000000000 632745 of 650760 -
06: 0c80261b0aa4f2477f53d8dffcecf9d3aba5b918f2ecd2e6573bbe363980b5b1 1.000000000000 841003 of 874630 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



4 inputs(s) for total of 2.130000000000 xmr

key image 00: a5ebeb8a557c2b2cb42d86856e33bed2113ed64d62ea7e23768da19c8db9d5cd amount: 0.030000000000
ring members blk
- 00: b30493b413fd9d4cc27a68b8aacadf503749f29c84e8ff07239c34bd160aa298 00100344
- 01: 032e92633091bc23f9f2c31938d8f53f6508511f16dec39caa69e7a0c978295c 00160022
- 02: bd5d1d0e8f2eba29e49c22d5672eb6ecee0ff3977958f1ded5f4c9f3cd912343 00851492
- 03: 91dcf81e6b4cbe34ab96410b6bbaccf567af3a4ece745dbf3f51957b474ff0fd 01165194
key image 01: 00115e034b0bf25002270062b3ccf2fe43e89a5cac4c7413252b669912620418 amount: 0.100000000000
ring members blk
- 00: 865e97dc4eeec73a733d3b9eb8c134936a04ce9c29056e8b7c584468a73d58c5 00227134
- 01: 097b3ff717538796bfe33513b1df5bae1cda21bd77318ba82f5da459a43a27db 00245412
- 02: abb4a4f39e317306034701ee50c29e1d4edb61c078e8188215ebd3c562d00f7f 00806793
- 03: 84a340668673fe7ddce22f5e1a79a76bb5fca3b693d68b90101456437a8268a8 01135871
key image 02: 445d20fa779186b41d494de585daf07e17ba622c05f5c7c486293396481bf656 amount: 1.000000000000
ring members blk
- 00: cf160f24c4cbcac664c9e294221b7656947d73a9c824fb303d4a61cc5b720b36 00096496
- 01: 5d82db838d6b54231351149f632836ccce2243c7beb85693705714946c66fac0 00296952
- 02: f6e0034b5f46f0af24a89aa5424a3db89093625a711aaeebaf7548b1886db5c8 00499062
- 03: 868a08434fecb4647c75dd53ab841b0aec96f0b2b4222da2be5b4759eb145f8e 01176126
key image 03: 821fb162e118bc3a878a53a68aacfa8ed5aa22abac0218a6cf1fe25fbb59ea1d amount: 1.000000000000
ring members blk
- 00: 45183eec59c81014d6d4d71201d0b41c81a0184282ab52e7a5e3098808be76d2 00336646
- 01: f47abcb177ba3a4cc30147fedd77f57e1f5ee1451fa3a697b57db714d968ea5f 00364681
- 02: 47b03e734fe2c599ba6124eaa47e8e36e7d9e7a5630c464fafc6c4938e39b17b 00391389
- 03: eab7365f53e65b4233108358d1456f86a26b185b9a2921278d4263da3fc1145e 01175626
More details
source code | moneroexplorer