Monero Transaction d45bef8b382fa8469e2b23b2e8f8038d6e90c06a59e26ef755545984c986586d

Autorefresh is OFF

Tx hash: d45bef8b382fa8469e2b23b2e8f8038d6e90c06a59e26ef755545984c986586d

Tx prefix hash: d6d7488601c1dacefda3ee77683d69944c3036d7cd703ff8d86182c8835a9e12
Tx public key: 58e060700e01dc2686316720481127027d645a17b75721c342d35f91e6bf7679
Payment id: 78b673350d5c0514e3cbd7442fc5de9a6f041555c24cf2d6726608b58f839412

Transaction d45bef8b382fa8469e2b23b2e8f8038d6e90c06a59e26ef755545984c986586d was carried out on the Monero network on 2014-05-20 11:13:31. The transaction has 3230114 confirmations. Total output fee is 0.000001000000 XMR.

Timestamp: 1400584411 Timestamp [UTC]: 2014-05-20 11:13:31 Age [y:d:h:m:s]: 10:177:09:59:58
Block: 48475 Fee (per_kB): 0.000001000000 (0.000001542169) Tx size: 0.6484 kB
Tx version: 1 No of confirmations: 3230114 RingCT/type: no
Extra: 02210078b673350d5c0514e3cbd7442fc5de9a6f041555c24cf2d6726608b58f8394120158e060700e01dc2686316720481127027d645a17b75721c342d35f91e6bf7679

7 output(s) for total of 1007.089999000000 xmr

stealth address amount amount idx tag
00: a7273dddef68beb1889b432619ab323db42d2d2ce6b5c4d6f9f2c21580b8f5f9 0.000009000000 5928 of 46395 -
01: e89943ec751ea831cfa20b1d5c9a6fb93e55e6c176b6796b458e91261089d1a0 0.000090000000 5826 of 61123 -
02: 18717a7555a8b56de9920f352e468459cee27e733d7348a5d9df8fa0c3e72164 0.000900000000 5854 of 81915 -
03: d72a8668fdb8b15043ca86d18cb3203fe331f60a55f0de79a847ecd4b20b5d2e 0.009000000000 5765 of 233398 -
04: 1d79c873efbd3b7c6b68b457806295d32c8985e3c78e370e5cdd2f2a0357cb64 0.080000000000 5428 of 269576 -
05: b5aa9e1caee101b0ebba27e35406381be5f1fc2f60d10d65ec8c86b59f46a874 7.000000000000 35631 of 285521 -
06: 0bb32d3105e75fa29312d16a5eddb7470e5fdbd6448c69401ad7fdb72c469f79 1000.000000000000 65 of 11881 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-04 21:29:37 till 2014-05-16 01:00:52; resolution: 0.07 days)

  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_*________________________________________________________________________________________________________________________________________________________________________|

3 inputs(s) for total of 1007.090000000000 xmr

key image 00: 52c237f902eba97c8ac2989ddbd2865c96588fe5d7bf12d0599f5dd8d7bb4116 amount: 7.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1cbefce6f283d0e53299bd1b405569e1816c8dba4d2c123ea05965f9a4ebaeec 00041506 1 3/11 2014-05-16 00:00:52 10:181:21:12:37
key image 01: 01dbf603b9cba388b08b4c454d4814760fb2b1ad82fe1c53cb1d03e5f0dbbd64 amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6c87f4d48cad1a4eb3fbef45b6e93c0e96454152e545d4e36e8abaef71c5b7e4 00024851 6 54/10 2014-05-04 22:29:37 10:192:22:43:52
key image 02: 90059e1fa51f3a21efa5bc30f56d4c541325540ed315e2cfc50f3c5ea7c05873 amount: 1000.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 38e117e62be299fd5ead0ede44275a65fd922ca3be395911202439d92ec9f4fd 00024851 6 54/10 2014-05-04 22:29:37 10:192:22:43:52
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 7000000000000, "key_offsets": [ 35534 ], "k_image": "52c237f902eba97c8ac2989ddbd2865c96588fe5d7bf12d0599f5dd8d7bb4116" } }, { "key": { "amount": 90000000000, "key_offsets": [ 2730 ], "k_image": "01dbf603b9cba388b08b4c454d4814760fb2b1ad82fe1c53cb1d03e5f0dbbd64" } }, { "key": { "amount": 1000000000000000, "key_offsets": [ 4 ], "k_image": "90059e1fa51f3a21efa5bc30f56d4c541325540ed315e2cfc50f3c5ea7c05873" } } ], "vout": [ { "amount": 9000000, "target": { "key": "a7273dddef68beb1889b432619ab323db42d2d2ce6b5c4d6f9f2c21580b8f5f9" } }, { "amount": 90000000, "target": { "key": "e89943ec751ea831cfa20b1d5c9a6fb93e55e6c176b6796b458e91261089d1a0" } }, { "amount": 900000000, "target": { "key": "18717a7555a8b56de9920f352e468459cee27e733d7348a5d9df8fa0c3e72164" } }, { "amount": 9000000000, "target": { "key": "d72a8668fdb8b15043ca86d18cb3203fe331f60a55f0de79a847ecd4b20b5d2e" } }, { "amount": 80000000000, "target": { "key": "1d79c873efbd3b7c6b68b457806295d32c8985e3c78e370e5cdd2f2a0357cb64" } }, { "amount": 7000000000000, "target": { "key": "b5aa9e1caee101b0ebba27e35406381be5f1fc2f60d10d65ec8c86b59f46a874" } }, { "amount": 1000000000000000, "target": { "key": "0bb32d3105e75fa29312d16a5eddb7470e5fdbd6448c69401ad7fdb72c469f79" } } ], "extra": [ 2, 33, 0, 120, 182, 115, 53, 13, 92, 5, 20, 227, 203, 215, 68, 47, 197, 222, 154, 111, 4, 21, 85, 194, 76, 242, 214, 114, 102, 8, 181, 143, 131, 148, 18, 1, 88, 224, 96, 112, 14, 1, 220, 38, 134, 49, 103, 32, 72, 17, 39, 2, 125, 100, 90, 23, 183, 87, 33, 195, 66, 211, 95, 145, 230, 191, 118, 121 ], "signatures": [ "517c028d964332efed347e8e925ef811c275dc39f216057b9e39cc24d4249d0bac5bb7a4e1bb83c0b58f22d7d56fed8eaf5adbe6f3d4439b3d7f458461d8e905", "9a8a55a7af21c6255a563016ceb4dd22fcbdb6be1d309c5337ddb87b1f19cc042a45cd84e7bc89d55fb0ed969f123137ce802c60931277c439b818eaa9ed3204", "bf469e23b878bc03c7edc829b64a4583b375bf8370c2cd0c053dca16c8e10a0be7451354687b3763b32c8b3feb4deb0fd65d42f38238e601a62c7f5b83c1d70b"] }


Less details
source code | moneroexplorer