Monero Transaction ba45813e01f872224fcbccb923334dbf9a33dcf7f7774f07d7b173a2fc629961

Autorefresh is OFF

Tx hash: ba45813e01f872224fcbccb923334dbf9a33dcf7f7774f07d7b173a2fc629961

Tx prefix hash: 89f29f811080531dff7f987fbd976e910fa1b63a61076bc9a18bdf987297d6d9
Tx public key: 617f688b687a3ab4c3a36e49ee0a07f5fbc551bb4f90fc7935af657524eaa680
Payment id: 8da8223bc4f544f7908e23199acc3f4198146172ba1241819703d6e4a38d7499

Transaction ba45813e01f872224fcbccb923334dbf9a33dcf7f7774f07d7b173a2fc629961 was carried out on the Monero network on 2014-06-17 04:40:06. The transaction has 3189735 confirmations. Total output fee is 0.005900000000 XMR.

Timestamp: 1402980006 Timestamp [UTC]: 2014-06-17 04:40:06 Age [y:d:h:m:s]: 10:149:16:28:32
Block: 88852 Fee (per_kB): 0.005900000000 (0.007542571785) Tx size: 0.7822 kB
Tx version: 1 No of confirmations: 3189735 RingCT/type: no
Extra: 0221008da8223bc4f544f7908e23199acc3f4198146172ba1241819703d6e4a38d749901617f688b687a3ab4c3a36e49ee0a07f5fbc551bb4f90fc7935af657524eaa680

5 output(s) for total of 8.875000000000 xmr

stealth address amount amount idx tag
00: 99737266a39c934f2730b99f06999e7e592d8b085af01644f4a15a97ce58cdf2 0.005000000000 147321 of 308584 -
01: 214cef0f23f5e0c32b009043cfd189c63b75c448b38744e8853a01769e8fc901 0.070000000000 61280 of 263947 -
02: 54608da2889a2c444c1b7c272dc42ce42d9c97cf0d6ad7df0bfd86c14e9c3b5d 0.800000000000 20161 of 489955 -
03: 82acab6a795129d6d11f60c6cd137948357cbb51fca9a187881a1b0a67c04253 1.000000000000 26687 of 874629 -
04: 9e53d5c05f128f003cfae35a713e89f35aac6eeb4aab94aa2fe0876fe6d23ad8 7.000000000000 39907 of 285521 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-05 15:13:04 till 2014-06-16 23:33:51; resolution: 0.07 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |________________________________________________________________________________________________________*_________________________________________________________________|
  • |______________________________________________________________________________________________________________________________________________________________________*___|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |__________________________________________________________________________________________________________________________________________________________________*_______|

5 inputs(s) for total of 8.880900000000 xmr

key image 00: 40183c78d3c801b059b15b8f2ff84c01d4adc80d03ac04452b0a6d39dcbbd27b amount: 0.000900000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 35dc96ca9063c2876090337247ce06f57a413755870dc31c344d7b1d6f190f04 00072038 1 30/310 2014-06-05 16:13:04 10:161:04:55:34
key image 01: d23b8002ed29dd8d2b2fd667b999da2d9106dbe74fe494aaed1147adff0a7b6a amount: 0.010000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4845609d6028961fa00c44a87f3d7f548dd191d9b2c3d4c6a62738e7c6caf792 00082052 1 4/18 2014-06-12 13:29:25 10:154:07:39:13
key image 02: 6d11674b5b6c120bbff5b9b162b2470a076bab399bf1cd0869d49f9777e4f16d amount: 0.800000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 51fb378ac9d895ea31a55760731619c7d1f1e2b62a801069ae051b6f6e5d84a6 00088206 1 16/32 2014-06-16 18:36:12 10:150:02:32:26
key image 03: bd03e57ec65123b19c470aeea23c4ace4cd7d25a85d7a435b4283e878ba3ac19 amount: 0.070000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c45cb0d740c5590f96089b2f696254efda2799dee1e1b832f057b612e39850c7 00088437 1 21/48 2014-06-16 22:33:51 10:149:22:34:47
key image 04: 409cc1acc77f9c88cd3c4406a447230c0b10a31340b670cb231cb39d2cc257c2 amount: 8.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0222a805854cd5868acd670efdbb2195d880aa105226021875fc3aa61ea2f51f 00087825 1 20/40 2014-06-16 11:26:25 10:150:09:42:13
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 900000000, "key_offsets": [ 28514 ], "k_image": "40183c78d3c801b059b15b8f2ff84c01d4adc80d03ac04452b0a6d39dcbbd27b" } }, { "key": { "amount": 10000000000, "key_offsets": [ 171667 ], "k_image": "d23b8002ed29dd8d2b2fd667b999da2d9106dbe74fe494aaed1147adff0a7b6a" } }, { "key": { "amount": 800000000000, "key_offsets": [ 19715 ], "k_image": "6d11674b5b6c120bbff5b9b162b2470a076bab399bf1cd0869d49f9777e4f16d" } }, { "key": { "amount": 70000000000, "key_offsets": [ 60453 ], "k_image": "bd03e57ec65123b19c470aeea23c4ace4cd7d25a85d7a435b4283e878ba3ac19" } }, { "key": { "amount": 8000000000000, "key_offsets": [ 4488 ], "k_image": "409cc1acc77f9c88cd3c4406a447230c0b10a31340b670cb231cb39d2cc257c2" } } ], "vout": [ { "amount": 5000000000, "target": { "key": "99737266a39c934f2730b99f06999e7e592d8b085af01644f4a15a97ce58cdf2" } }, { "amount": 70000000000, "target": { "key": "214cef0f23f5e0c32b009043cfd189c63b75c448b38744e8853a01769e8fc901" } }, { "amount": 800000000000, "target": { "key": "54608da2889a2c444c1b7c272dc42ce42d9c97cf0d6ad7df0bfd86c14e9c3b5d" } }, { "amount": 1000000000000, "target": { "key": "82acab6a795129d6d11f60c6cd137948357cbb51fca9a187881a1b0a67c04253" } }, { "amount": 7000000000000, "target": { "key": "9e53d5c05f128f003cfae35a713e89f35aac6eeb4aab94aa2fe0876fe6d23ad8" } } ], "extra": [ 2, 33, 0, 141, 168, 34, 59, 196, 245, 68, 247, 144, 142, 35, 25, 154, 204, 63, 65, 152, 20, 97, 114, 186, 18, 65, 129, 151, 3, 214, 228, 163, 141, 116, 153, 1, 97, 127, 104, 139, 104, 122, 58, 180, 195, 163, 110, 73, 238, 10, 7, 245, 251, 197, 81, 187, 79, 144, 252, 121, 53, 175, 101, 117, 36, 234, 166, 128 ], "signatures": [ "fa42087e10e8ae0086d93c7c2628920d22689608fd282b8130c014ebc2079f038b4e32ef2014685c7e2478bab7a4b9fc5390c2f5dc9c935f14e4664d9c264b05", "a14cb96e6d89066366662537158662b989a978c94c91f81a38a7f4db1b37aa0df019ac3197332b266dff19c6eaedd7229ca6ec6d794b01e975ad9b5e9c79e10e", "8117ffd3923870dabf3f32854787af3a8e4e4c3984cb930f488ae1b8251958009ce0c7f9bdea3d5949ab7e6f4afd38a1ed1bb2b2aeaee88a15656469bbbe4b0f", "ddf750b5913e32a5037ff5462c6a7bb5d7b34bb9c6094dec275be9f8aea5ea0844c08109e9d1a2dfddb4096cb30bc940420a0a263b21a6bd6a1fad84a95d3a0b", "ff09f34f609669c61425c0b0de87302d120de4d0798b7928288010242d83ed0ff89652e96bff7dca767e039a1598855504ff24191ffc39ae71df3c1b2038ec02"] }


Less details
source code | moneroexplorer