Monero Transaction baef39258ed16bc578477b882bd0a01b89f5f01b6f35b4c5066e21bf937ac8ac

Autorefresh is OFF

Tx hash: baef39258ed16bc578477b882bd0a01b89f5f01b6f35b4c5066e21bf937ac8ac

Tx prefix hash: 4114809b83c4ccdca62691ef1f74d32d0f04dd8813eacb1f95494a1b79a9bc9e
Tx public key: e1928e0860b3022d3bd20e883bc9ec4e9151240fcaee9c76d8eada5adf532bd9
Payment id: 17039cd156402df9a2a735fa25d75fff861c86287626b65fb8673d1fa7a9b3e9

Transaction baef39258ed16bc578477b882bd0a01b89f5f01b6f35b4c5066e21bf937ac8ac was carried out on the Monero network on 2015-08-20 18:01:51. The transaction has 2586910 confirmations. Total output fee is 0.027931585921 XMR.

Timestamp: 1440093711 Timestamp [UTC]: 2015-08-20 18:01:51 Age [y:d:h:m:s]: 09:101:19:59:55
Block: 703679 Fee (per_kB): 0.027931585921 (0.030107309456) Tx size: 0.9277 kB
Tx version: 1 No of confirmations: 2586910 RingCT/type: no
Extra: 02210017039cd156402df9a2a735fa25d75fff861c86287626b65fb8673d1fa7a9b3e901e1928e0860b3022d3bd20e883bc9ec4e9151240fcaee9c76d8eada5adf532bd9

6 output(s) for total of 22.080000000000 xmr

stealth address amount amount idx tag
00: 146a0ea9abfad1f95fc973669cc8252f1e0b085f45cb76f6b49916f62e29d5c4 0.080000000000 152570 of 269576 -
01: 202b639105ac8ee5ad2dc59e7d400ba7f3a74bebabba7f945a88bd59be8ee3d4 0.200000000000 978406 of 1272210 -
02: 1f07e9be766b10514c15bde82fe00b6fd98225f7d2dbcdf517f88571fb81047c 0.800000000000 321901 of 489955 -
03: b61397296ceede769d782f2809bc76d6e878b7e564b24048c2b425fbcff85120 3.000000000000 206215 of 300495 -
04: 8d526a7ab37966a25fcdbd3b8f0157368eab5b80c91c3789182b11e523a81888 8.000000000000 46596 of 226902 -
05: 023aea46ed63f1daea0141bd9e5bd748ecae71f8585532040c3c25e904ca8437 10.000000000000 690565 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-07-03 10:21:14 till 2015-08-20 07:53:15; resolution: 0.28 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |________________________________________________________________________________________________________________________________________________________________*_________|
  • |_______________________________________________________________________________________________________________________________________________________________*__________|
  • |_______________________________________________________________________________________________________________________________________________________________*__________|
  • |________________________________________________________________________________________________________________________________________________________________________*_|
  • |_________________________________________________________________________________________________________________________________________________________________________*|

6 inputs(s) for total of 22.107931585921 xmr

key image 00: 47599b271c90ef1711fdb94d0a399d9f86918c0dc469eef1843150b4e53a4456 amount: 0.007931585921
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 07adb37a439847d48ba0b4fbc90b964a44df1e943803e08c95ea98f0c23ebe09 00634737 0 0/4 2015-07-03 11:21:14 09:150:02:40:32
key image 01: eb888b637608f2cacb8f27cd1c980432f51699cb0a3689bf72e6f23f854447fc amount: 0.050000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4a3d0276b16d3793c3b128b8a56a4a2b0011f36d5b104616c00a33b8c8f691fb 00699219 0 0/3 2015-08-17 13:26:29 09:105:00:35:17
key image 02: d391698c6527512bcbb98e2b1f916629402038e690db1e888fed9e5123adc85a amount: 9.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: cf80dd40bebec717d88381fb6f94bb63197ac4cf8cf92d7513f9910a4d7926a3 00699119 0 0/3 2015-08-17 11:36:47 09:105:02:24:59
key image 03: ae406a874f52fe45fe7923f1f931d0b4001c01c04e16ba858abdb8e42c9df83e amount: 0.050000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d3324501647aaf58e5b19db63257257c43bcd705bfb417d55206918482a0a478 00698753 0 0/3 2015-08-17 06:27:25 09:105:07:34:21
key image 04: 16acac1bdf5a8e4333f0c818226fbda881829945044dc4914a25d04599b25f1e amount: 9.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5ea82331e5a095b075376b351fd717873e2151c03bfa7065641ad4f48ef47a14 00702533 0 0/3 2015-08-19 22:26:04 09:102:15:35:42
key image 05: a3db1a508551ed90810e4ab8df04286782c7270e530af881b2651576df6f7949 amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c2fe3d7b61969bd355f95401624fe4299c851323840a664b3302048c6027fb42 00702974 1 3/3 2015-08-20 06:53:15 09:102:07:08:31
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 7931585921, "key_offsets": [ 0 ], "k_image": "47599b271c90ef1711fdb94d0a399d9f86918c0dc469eef1843150b4e53a4456" } }, { "key": { "amount": 50000000000, "key_offsets": [ 173213 ], "k_image": "eb888b637608f2cacb8f27cd1c980432f51699cb0a3689bf72e6f23f854447fc" } }, { "key": { "amount": 9000000000000, "key_offsets": [ 155859 ], "k_image": "d391698c6527512bcbb98e2b1f916629402038e690db1e888fed9e5123adc85a" } }, { "key": { "amount": 50000000000, "key_offsets": [ 172887 ], "k_image": "ae406a874f52fe45fe7923f1f931d0b4001c01c04e16ba858abdb8e42c9df83e" } }, { "key": { "amount": 9000000000000, "key_offsets": [ 159575 ], "k_image": "16acac1bdf5a8e4333f0c818226fbda881829945044dc4914a25d04599b25f1e" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 172039 ], "k_image": "a3db1a508551ed90810e4ab8df04286782c7270e530af881b2651576df6f7949" } } ], "vout": [ { "amount": 80000000000, "target": { "key": "146a0ea9abfad1f95fc973669cc8252f1e0b085f45cb76f6b49916f62e29d5c4" } }, { "amount": 200000000000, "target": { "key": "202b639105ac8ee5ad2dc59e7d400ba7f3a74bebabba7f945a88bd59be8ee3d4" } }, { "amount": 800000000000, "target": { "key": "1f07e9be766b10514c15bde82fe00b6fd98225f7d2dbcdf517f88571fb81047c" } }, { "amount": 3000000000000, "target": { "key": "b61397296ceede769d782f2809bc76d6e878b7e564b24048c2b425fbcff85120" } }, { "amount": 8000000000000, "target": { "key": "8d526a7ab37966a25fcdbd3b8f0157368eab5b80c91c3789182b11e523a81888" } }, { "amount": 10000000000000, "target": { "key": "023aea46ed63f1daea0141bd9e5bd748ecae71f8585532040c3c25e904ca8437" } } ], "extra": [ 2, 33, 0, 23, 3, 156, 209, 86, 64, 45, 249, 162, 167, 53, 250, 37, 215, 95, 255, 134, 28, 134, 40, 118, 38, 182, 95, 184, 103, 61, 31, 167, 169, 179, 233, 1, 225, 146, 142, 8, 96, 179, 2, 45, 59, 210, 14, 136, 59, 201, 236, 78, 145, 81, 36, 15, 202, 238, 156, 118, 216, 234, 218, 90, 223, 83, 43, 217 ], "signatures": [ "6729000940f94afa7480f7e9d179009f5322f4bd2aaf122efe56c76a79ccb00e29aff34b80490c693425fec77cee7304e79e5e58fda415d4d2ccd11733826600", "71e76189dde22212466617e605f95b8678a5d8f0b73bec069733926f2ae9710056c3444f4df243a745539213ec0275c8fa27387253324956d1d4ef3fb18efe01", "6d98b8efb72566ab8dfb09e455254f52b466f906eb8b9b664e154b0f6b960c0379cc523ee4916a570260dcc0408c993a139b94e5db88c50335235796034fba0b", "7f44c0f330768cd5de6b32311af43f62fa69604b455c755459323703196a73020ac9b4451e4572e2308f97c7070c6fd329efc0c42e39bd2c45df1d1b4701f10d", "22880b6adc98e7cf92d9f3294f77c0434daf5d8a59361bdead0a3e3314e6d400cc1f5e094c56a62df43cb0e995af46ab6cdb7181ee9d160293c1d4ed60380302", "cef4c1d76f1aab5a87a60e616b9eea8c230f71116bf6ddd4618a05525611b50ea6f7d6eb0e8d4f02b880fba65903b3e7576b2718a1a5dd41d622bb80b088790d"] }


Less details
source code | moneroexplorer