Monero Transaction dd0dd75ce9769303429e3847ebe49d99d914d24feac7a63318b56e378f0afe4c

Autorefresh is OFF

Tx hash: dd0dd75ce9769303429e3847ebe49d99d914d24feac7a63318b56e378f0afe4c

Tx prefix hash: 9bd56036bf080707fd54f47db0d939d14fc66b8050235b3acdf7013dcc832bc9
Tx public key: d45107477f5192132f988262f3f6c4af46eef92cebeb4cfef47692e4ecb221fb

Transaction dd0dd75ce9769303429e3847ebe49d99d914d24feac7a63318b56e378f0afe4c was carried out on the Monero network on 2016-08-22 22:44:45. The transaction has 2174586 confirmations. Total output fee is 0.015000000000 XMR.

Timestamp: 1471905885 Timestamp [UTC]: 2016-08-22 22:44:45 Age [y:d:h:m:s]: 08:103:08:05:19
Block: 1119413 Fee (per_kB): 0.015000000000 (0.021012311902) Tx size: 0.7139 kB
Tx version: 1 No of confirmations: 2174586 RingCT/type: no
Extra: 01d45107477f5192132f988262f3f6c4af46eef92cebeb4cfef47692e4ecb221fb

2 output(s) for total of 7.005000000000 xmr

stealth address amount amount idx tag
00: 4db9d8e3f92c4ceff68c1629016076712fd3a161f196eacc60e116969bd98527 0.005000000000 266171 of 308585 -
01: 357cc6c2708e80971171131723e8f4f84dfe7903eb0737688524a126dbc3a305 7.000000000000 259973 of 285521 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-10 13:35:50 till 2016-08-22 22:32:02; resolution: 4.73 days)

  • |_________________________________________________*________________________________________________________________**_____________________________________________________*|
  • |_***_____________________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 7.020000000000 xmr

key image 00: 3c474e789a2b68a8d44abdebc39d0d1b234149fc59886b2400771699a321d194 amount: 7.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d7dad0f7c3630772cc034f87b958fe75a499cc2d639a0cfc23fd1c94b0bf2ff5 00408001 1 130/138 2015-01-26 00:58:48 09:313:05:51:16
- 01: 5a2542845300acdde0aa62a9025e0d4c8b738bb7f309b2183c4912a82aab622f 00854221 0 0/4 2015-12-04 15:42:04 09:000:15:08:00
- 02: 436774669f439ee4754da6c6babec6731c672afccc3b3536f95e65732cecf7ab 00855356 0 0/3 2015-12-05 11:13:29 08:364:19:36:35
- 03: 41cdb9715dd30a3652ae3f58165597241a9bf97701ac1f156c48e26f7a4a7d61 01119385 3 4/8 2016-08-22 21:32:02 08:103:09:18:02
key image 01: fa56d38199f3e43820a14364190770041478328ad2ab8e5af4f087ecfef4ed6e amount: 0.020000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9770a7d623d23b51b56286b7937ef3b0182b241f7d67716e8450366c48085ee1 00079155 1 9/124 2014-06-10 14:35:50 10:177:16:14:14
- 01: b2d80c207524502532d9ba237e3173841152061be6f47da25b994fcb6babe9c0 00086533 1 1/87 2014-06-15 14:11:54 10:172:16:38:10
- 02: 68017d5af2edbc7fff2340e094aa4362b0615f6f5b1443488dc7f9e19977da9e 00093663 1 1/111 2014-06-20 12:48:09 10:167:18:01:55
- 03: da79dfa5001eda77886be3504e73840e5e483b9a742e17cfda5c19853dc0d348 01119385 3 4/8 2016-08-22 21:32:02 08:103:09:18:02
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 7000000000000, "key_offsets": [ 67880, 50345, 1252, 140473 ], "k_image": "3c474e789a2b68a8d44abdebc39d0d1b234149fc59886b2400771699a321d194" } }, { "key": { "amount": 20000000000, "key_offsets": [ 91027, 56774, 28510, 156159 ], "k_image": "fa56d38199f3e43820a14364190770041478328ad2ab8e5af4f087ecfef4ed6e" } } ], "vout": [ { "amount": 5000000000, "target": { "key": "4db9d8e3f92c4ceff68c1629016076712fd3a161f196eacc60e116969bd98527" } }, { "amount": 7000000000000, "target": { "key": "357cc6c2708e80971171131723e8f4f84dfe7903eb0737688524a126dbc3a305" } } ], "extra": [ 1, 212, 81, 7, 71, 127, 81, 146, 19, 47, 152, 130, 98, 243, 246, 196, 175, 70, 238, 249, 44, 235, 235, 76, 254, 244, 118, 146, 228, 236, 178, 33, 251 ], "signatures": [ "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", "3542257726566e53e47cc43678211770deb43dbe29092fefc7cc3ebb9035aa0112fed5d8edda8789db0e91ded5e5ab9c79f9d0c22376f29c55abb4e4ed68f60b4076094d74843bab0d41d64f58534f93c2f721f9ecdabbb278d6fe03a17b9f0bf5dbc962810b879816043ddbac19d457f035030ff82b3f66413fe6d14945880ad37fd4f549b0b899f8a9b632eed1e2970294760f9e1e75c909ad7af522b3d508969dd42cf86dcadf5b349a6c499b7927ef06ccd8b8094b768856d27cdefdde02ba4d58b66ed795ad9d2697f3f8b2b2670a1b32aa0e08401a918465f10100150abedbee8b5421bb20b45179c40181d91cec0385db3be13ac7d1415563aadd8a02"] }


Less details
source code | moneroexplorer