Monero Transaction b80f66b7fab84f9ea71d8c7c58d1d8a9697b2818bafc7568bde2f3734919ae1d

Autorefresh is OFF

Tx hash: b80f66b7fab84f9ea71d8c7c58d1d8a9697b2818bafc7568bde2f3734919ae1d

Tx prefix hash: 45602902eeff1e786f7d033b7ea50ac6f74661cc409860a310d98ed16ef0b095
Tx public key: c997f31a97476c73c3326613175484f4ffe774339f82939580929f120a81ce29

Transaction b80f66b7fab84f9ea71d8c7c58d1d8a9697b2818bafc7568bde2f3734919ae1d was carried out on the Monero network on 2014-06-04 06:17:58. The transaction has 3171469 confirmations. Total output fee is 0.005669434569 XMR.

Timestamp: 1401862678 Timestamp [UTC]: 2014-06-04 06:17:58 Age [y:d:h:m:s]: 10:111:01:10:20
Block: 70020 Fee (per_kB): 0.005669434569 (0.015522729943) Tx size: 0.3652 kB
Tx version: 1 No of confirmations: 3171469 RingCT/type: no
Extra: 01c997f31a97476c73c3326613175484f4ffe774339f82939580929f120a81ce29

6 output(s) for total of 0.094330565431 xmr

stealth address amount amount idx tag
00: 805a35fc414d43b6b35796d34b08143805e24060f7f238c92096085fde64b5b7 0.000488639210 0 of 5 -
01: 3ed514fc79f03c36c57915178bf86ad04ca3fcefa9c483eb3a5c349eaac8d813 0.000488639210 1 of 5 -
02: b98b5355132e8a768c71d55abd741d067ec738f98e0dd072ef753bbfc4beb8d6 0.001692353040 0 of 1 -
03: 6bc6f82c4c5bdb243afbec64f004089f5d8be84ea521a25b8d694ad8144d13cf 0.004660933971 0 of 1 -
04: 5469f0d682d242c76e6472496074a605077917985724397a0c73d0f26518cbaa 0.007000000000 40307 of 247340 -
05: 4c969617c1563bd1ade921bc405146d220765d28f2de39b5171de6e250b041ec 0.080000000000 19948 of 269575 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-04 04:30:14 till 2014-06-04 06:30:14; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|

1 inputs(s) for total of 0.100000000000 xmr

key image 00: 9c1ba476270d5d01da2afbf19c891c9af723d9ca04613c824ddb30e31dea0a4a amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 278ee15def89f0e6beed69c832c8d4f8f8b37d695f323e7424175a9f7652e351 00069970 1 15/135 2014-06-04 05:30:14 10:111:01:58:04
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 100000000000, "key_offsets": [ 33842 ], "k_image": "9c1ba476270d5d01da2afbf19c891c9af723d9ca04613c824ddb30e31dea0a4a" } } ], "vout": [ { "amount": 488639210, "target": { "key": "805a35fc414d43b6b35796d34b08143805e24060f7f238c92096085fde64b5b7" } }, { "amount": 488639210, "target": { "key": "3ed514fc79f03c36c57915178bf86ad04ca3fcefa9c483eb3a5c349eaac8d813" } }, { "amount": 1692353040, "target": { "key": "b98b5355132e8a768c71d55abd741d067ec738f98e0dd072ef753bbfc4beb8d6" } }, { "amount": 4660933971, "target": { "key": "6bc6f82c4c5bdb243afbec64f004089f5d8be84ea521a25b8d694ad8144d13cf" } }, { "amount": 7000000000, "target": { "key": "5469f0d682d242c76e6472496074a605077917985724397a0c73d0f26518cbaa" } }, { "amount": 80000000000, "target": { "key": "4c969617c1563bd1ade921bc405146d220765d28f2de39b5171de6e250b041ec" } } ], "extra": [ 1, 201, 151, 243, 26, 151, 71, 108, 115, 195, 50, 102, 19, 23, 84, 132, 244, 255, 231, 116, 51, 159, 130, 147, 149, 128, 146, 159, 18, 10, 129, 206, 41 ], "signatures": [ "0cebf5a5976cf93c9f73dd0d090b08416caf0c3f0728dd1cbab1623ba0df7004347187de6165e862c6251c6a9270519f114d118bc3c946edf9335c8608c1e904"] }


Less details
source code | moneroexplorer