Monero Transaction d80802f6a1f682b49a8ad2d1586d463eec3a67cbd1b26887a15216e8a4de2b83

Autorefresh is OFF

Tx hash: d80802f6a1f682b49a8ad2d1586d463eec3a67cbd1b26887a15216e8a4de2b83

Tx prefix hash: d74f4661af6e31e8db18695cc7e1819a105afdf6c46a4fd25a23accfa0d00666
Tx public key: c47bbf80329eb61b5afa4c8f1f7197a1b0ffbf8f3b902396ed2ea5d0763cb721
Payment id: bbb3b3dec73a9892b2eeae30b09dcd3effb496bf99502fae33ed42a9c7efdb61

Transaction d80802f6a1f682b49a8ad2d1586d463eec3a67cbd1b26887a15216e8a4de2b83 was carried out on the Monero network on 2014-08-07 11:35:17. The transaction has 3144302 confirmations. Total output fee is 0.005877460000 XMR.

Timestamp: 1407411317 Timestamp [UTC]: 2014-08-07 11:35:17 Age [y:d:h:m:s]: 10:138:04:55:04
Block: 162908 Fee (per_kB): 0.005877460000 (0.008672217637) Tx size: 0.6777 kB
Tx version: 1 No of confirmations: 3144302 RingCT/type: no
Extra: 022100bbb3b3dec73a9892b2eeae30b09dcd3effb496bf99502fae33ed42a9c7efdb6101c47bbf80329eb61b5afa4c8f1f7197a1b0ffbf8f3b902396ed2ea5d0763cb721

7 output(s) for total of 10.994122540000 xmr

stealth address amount amount idx tag
00: 4e3caa13a27ec4d723237fa78bf982e7685109f8248204236fdfbf3a65965f42 0.000122540000 2 of 3 -
01: 64214514b4b1b14d97422f7fc0fe1a66a526d3f7b4712e0ab7fff9213ddf8c93 0.005000000000 204743 of 308585 -
02: 8006f20f67226e91547ea7c2390653edf56149be7751e30b6cb4988ef7f058eb 0.009000000000 158455 of 233398 -
03: 2a8a2bd36d4dd29d8e06edd71ac5776f8b0286e13f38f95b7063ba7028fa7d66 0.080000000000 88551 of 269576 -
04: c5c7a36bfbf6e8ce1b237181b70a9ed9138b37e860ee27e54c5f3e1f9cb849cc 0.900000000000 78689 of 454894 -
05: e1cf65842f56438974f6314ff28f4320aa052217848b3763560b0624f8287af5 5.000000000000 93923 of 255089 -
06: e58a0f812a89eb7794ab738d963fa04a3b8fa0b2e2c99acccbf88ce0c0a79d88 5.000000000000 93924 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-01 02:49:08 till 2014-08-07 11:37:10; resolution: 0.40 days)

  • |________________________________________________________________________________________________________________*________________________________________________________*|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 11.000000000000 xmr

key image 00: 385e026c167b3ea7246a74e175cfeb0134b8fa3f43e74dafd28ae7ac3d0e499a amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: dc460c13eb5cd16bb823f0169d5bdf6a5c24ffee8abfe26fa809a922bf42e116 00129680 1 10/4 2014-07-15 11:38:43 10:161:04:51:38
- 01: 671777a55cba1003c6d51905f48e83bf219ddca6b16cd26ea4f2860881d640c9 00162828 0 0/5 2014-08-07 10:37:10 10:138:05:53:11
key image 01: 1158fc1a04929765ce66878bd87f164f06e90ddf87b3e9e451c8387b0ce1194d amount: 6.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 20aa3751ec7242e10473c5dafc95cc0c40f27d1b30600e603597bfbf422ab961 00065603 1 75/179 2014-06-01 03:49:08 10:205:12:41:13
- 01: 8692134203ce1ea7f8ef3d49b7f965af4aee9be09f5fa17e4a97a4fd73413279 00162766 2 4/152 2014-08-07 09:48:50 10:138:06:41:32
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000000, "key_offsets": [ 53532, 40292 ], "k_image": "385e026c167b3ea7246a74e175cfeb0134b8fa3f43e74dafd28ae7ac3d0e499a" } }, { "key": { "amount": 6000000000000, "key_offsets": [ 28962, 45126 ], "k_image": "1158fc1a04929765ce66878bd87f164f06e90ddf87b3e9e451c8387b0ce1194d" } } ], "vout": [ { "amount": 122540000, "target": { "key": "4e3caa13a27ec4d723237fa78bf982e7685109f8248204236fdfbf3a65965f42" } }, { "amount": 5000000000, "target": { "key": "64214514b4b1b14d97422f7fc0fe1a66a526d3f7b4712e0ab7fff9213ddf8c93" } }, { "amount": 9000000000, "target": { "key": "8006f20f67226e91547ea7c2390653edf56149be7751e30b6cb4988ef7f058eb" } }, { "amount": 80000000000, "target": { "key": "2a8a2bd36d4dd29d8e06edd71ac5776f8b0286e13f38f95b7063ba7028fa7d66" } }, { "amount": 900000000000, "target": { "key": "c5c7a36bfbf6e8ce1b237181b70a9ed9138b37e860ee27e54c5f3e1f9cb849cc" } }, { "amount": 5000000000000, "target": { "key": "e1cf65842f56438974f6314ff28f4320aa052217848b3763560b0624f8287af5" } }, { "amount": 5000000000000, "target": { "key": "e58a0f812a89eb7794ab738d963fa04a3b8fa0b2e2c99acccbf88ce0c0a79d88" } } ], "extra": [ 2, 33, 0, 187, 179, 179, 222, 199, 58, 152, 146, 178, 238, 174, 48, 176, 157, 205, 62, 255, 180, 150, 191, 153, 80, 47, 174, 51, 237, 66, 169, 199, 239, 219, 97, 1, 196, 123, 191, 128, 50, 158, 182, 27, 90, 250, 76, 143, 31, 113, 151, 161, 176, 255, 191, 143, 59, 144, 35, 150, 237, 46, 165, 208, 118, 60, 183, 33 ], "signatures": [ "c9fa5dab7e99f71a48ec6a1864f4aca0659be4808f728ec220c36275115f800889584492362ae96cec50cc6b813314bcad9b239bca2f3562fc21c8cc11cf100ca145461ed49b18b1e21b6d13ed31f2930a7e118d88f6266fa13f895edf0b0b0eb6cd85e757a4198e33bf36352aad2c4e40ccfdf42b6ca4751bb28f9f61893105", "f1074fca21c716167b314010c45f49912c1bf86457ee6cc2d219f26061861f0eaba4121d5640d5f6b7824a7d45c0de6de77d003d68cf2d77526dbc03014b5b0a3dfbd462748cadcfa56cae1ab4b75e100c625dabdc7aaf727b40aaeee0f5700b57b58a4e929ea24da9dbb446d1bcf19101d4bdcdb374ee612a7ba21fa8220f0e"] }


Less details
source code | moneroexplorer