Monero Transaction dbb11fa42f42b6a54b23572f0bd3f54f5afbeb7ae65800043edceccac601c70e

Autorefresh is OFF

Tx hash: dbb11fa42f42b6a54b23572f0bd3f54f5afbeb7ae65800043edceccac601c70e

Tx prefix hash: d9080de220cb69b4504b4abc240f8d714bfc87d359fbea8c8ecc61da89a93477
Tx public key: a1e2b6a3f9737a5b5f826775bbdd927d1f48486d4c8ed3e4aeb97909a27bb5bb

Transaction dbb11fa42f42b6a54b23572f0bd3f54f5afbeb7ae65800043edceccac601c70e was carried out on the Monero network on 2014-06-23 17:29:18. The transaction has 3180034 confirmations. Total output fee is 0.005961775481 XMR.

Timestamp: 1403544558 Timestamp [UTC]: 2014-06-23 17:29:18 Age [y:d:h:m:s]: 10:142:22:44:44
Block: 98406 Fee (per_kB): 0.005961775481 (0.008796625494) Tx size: 0.6777 kB
Tx version: 1 No of confirmations: 3180034 RingCT/type: no
Extra: 01a1e2b6a3f9737a5b5f826775bbdd927d1f48486d4c8ed3e4aeb97909a27bb5bb

6 output(s) for total of 0.217038224519 xmr

stealth address amount amount idx tag
00: d30af42c67cc68b798c138975611e6b50042f5f9d723ae6902701fbfa579af02 0.000038224519 0 of 1 -
01: 753b879bb1b21a0cce6b4922f4ab08fc87a12ffd7f764c15a07c891c57812a82 0.008000000000 147620 of 245068 -
02: 9cbbf5b7d7a099510261d998ce90ad40451c709f875507e34efc39b775acd257 0.009000000000 142388 of 233398 -
03: 7ddc92fa1957a5546f6ecd1f5df198ddb32262005726ddf3e222c577d9a23e32 0.010000000000 303013 of 502466 -
04: a8252861bca058ee9162b6984988be161468c9d63ff8a55e9fe8b04dda8b5c69 0.090000000000 65678 of 317822 -
05: 639d46b80b0769a197f6780f19f87c6a625c6716bd2d3b13d8431c2341398983 0.100000000000 152639 of 982315 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-16 07:55:04 till 2014-06-23 18:18:07; resolution: 0.04 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_______________________________________________________________________________________________________________________________________________________*__________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |___________________________________________________________________________________________________________________________*______________________________________________|

4 inputs(s) for total of 0.223000000000 xmr

key image 00: 793a40c2517395b6b4740f351999c72f16329bc5122cd95556803f63af493286 amount: 0.003000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 72ab3c88bb7f06c47f6450488ac6f0eb7269dab3be031721416f7b4738fe410d 00087658 1 5/8 2014-06-16 08:55:04 10:150:07:18:58
key image 01: 8edc8c8af9c5ca22ea5c994d4b80d2d4626121c53762bc04d646cfb91de17179 amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 2710d9ec670a1d78f33a0cf20f808388705d906eea8ff588b3e5755d187e9bed 00097307 1 2/5 2014-06-22 22:32:46 10:143:17:41:16
key image 02: be74fdf0e3e6af624b4d995ca1c50879c88aa1063ae5abbfb007d77ee2fc1d4d amount: 0.080000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 66fd74370da87380b4a12b4687c9992178b17488b769955f74b2a85e812625ee 00098391 1 2/8 2014-06-23 17:18:07 10:142:22:55:55
key image 03: 4f0e0fa12483137929d9e645270859d515472e09059ff0730047e9bfb046a2cf amount: 0.050000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: afc48e8cce6e72d47259fd02609650352be1028adbd3a54744d15622dab0c425 00095553 1 5/7 2014-06-21 17:41:40 10:144:22:32:22
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 3000000000, "key_offsets": [ 35896 ], "k_image": "793a40c2517395b6b4740f351999c72f16329bc5122cd95556803f63af493286" } }, { "key": { "amount": 90000000000, "key_offsets": [ 65036 ], "k_image": "8edc8c8af9c5ca22ea5c994d4b80d2d4626121c53762bc04d646cfb91de17179" } }, { "key": { "amount": 80000000000, "key_offsets": [ 69851 ], "k_image": "be74fdf0e3e6af624b4d995ca1c50879c88aa1063ae5abbfb007d77ee2fc1d4d" } }, { "key": { "amount": 50000000000, "key_offsets": [ 93230 ], "k_image": "4f0e0fa12483137929d9e645270859d515472e09059ff0730047e9bfb046a2cf" } } ], "vout": [ { "amount": 38224519, "target": { "key": "d30af42c67cc68b798c138975611e6b50042f5f9d723ae6902701fbfa579af02" } }, { "amount": 8000000000, "target": { "key": "753b879bb1b21a0cce6b4922f4ab08fc87a12ffd7f764c15a07c891c57812a82" } }, { "amount": 9000000000, "target": { "key": "9cbbf5b7d7a099510261d998ce90ad40451c709f875507e34efc39b775acd257" } }, { "amount": 10000000000, "target": { "key": "7ddc92fa1957a5546f6ecd1f5df198ddb32262005726ddf3e222c577d9a23e32" } }, { "amount": 90000000000, "target": { "key": "a8252861bca058ee9162b6984988be161468c9d63ff8a55e9fe8b04dda8b5c69" } }, { "amount": 100000000000, "target": { "key": "639d46b80b0769a197f6780f19f87c6a625c6716bd2d3b13d8431c2341398983" } } ], "extra": [ 1, 161, 226, 182, 163, 249, 115, 122, 91, 95, 130, 103, 117, 187, 221, 146, 125, 31, 72, 72, 109, 76, 142, 211, 228, 174, 185, 121, 9, 162, 123, 181, 187 ], "signatures": [ "120a8fddb52e90bcc379e07b3f7407b217370c6cd16486767e88832376eb4405c22c7d36bf2f177c1a4a6c280751e7c44be8e3453ae096078b7405a28bcb7a06", "7f4bee0e17212de753589b799db29d2ebe661f38429a13b52b20a2d6c81b560a8b8c293cd64c1047a1a2dc2f23b12e1d7b7532593456d60b690c70ce6b29420f", "507748d28209b53114cf59024d171423b057acf967dde3ddb3cc7b6a6dd9b5024b1a11cee1a96c3cbed28b6cb6f1fed9ac2a6169d650d63ffce41d71b19d9f0c", "78b85bb8c31b853b3e8df1c35f4610528b111465efd0380c3203f5a4b94a5c06336984e7ad72fbc8e507ed0254056626830c8aa932fdbb2fe9fbf38a9055f90d"] }


Less details
source code | moneroexplorer