Monero Transaction fbda7e5591221cbaacd4c699a6f0f6f637b071ed5194516c987752c30fba27e5

Autorefresh is OFF

Tx hash: fbda7e5591221cbaacd4c699a6f0f6f637b071ed5194516c987752c30fba27e5

Tx prefix hash: c58ad5c2b3f5bfce41ca3e9ebaf1decbf00b82a80d1e51e1717bcda36a8d7e89
Tx public key: 09aaf1e60dd77ea15c508535cdbc7025f40452c66755f551a53161d727c54009

Transaction fbda7e5591221cbaacd4c699a6f0f6f637b071ed5194516c987752c30fba27e5 was carried out on the Monero network on 2014-07-15 17:45:33. The transaction has 3148389 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1405446333 Timestamp [UTC]: 2014-07-15 17:45:33 Age [y:d:h:m:s]: 10:120:21:51:00
Block: 130028 Fee (per_kB): 0.010000000000 (0.017268128162) Tx size: 0.5791 kB
Tx version: 1 No of confirmations: 3148389 RingCT/type: no
Extra: 0109aaf1e60dd77ea15c508535cdbc7025f40452c66755f551a53161d727c54009

6 output(s) for total of 30.810000000000 xmr

stealth address amount amount idx tag
00: 0edd5d01b18bd6ea6d1c3b677fb225c5d895758338de2dd90e0c059ea12318bc 0.010000000000 313623 of 502466 -
01: 3a02f00e5d45c6d08818a108d59b13481bde36b3ee9249a85c14b30f7c2d3d73 0.300000000000 101389 of 976536 -
02: c871aa2eb5de0edc0b311bb7f54aca499785421d0c302a5802b4c8967d91b8f3 0.500000000000 125743 of 1118624 -
03: 18a373def07f53715851ff043649de44429dad69b37ba6b95c784ed33adcadd5 4.000000000000 23131 of 237197 -
04: ba134fcc53f1ff1382cfb35155805c3cbe82fb148bdd7a4a8bfe88afdfe88d73 6.000000000000 69242 of 207703 -
05: deea62c2458a1344de6fddbebd3f102d640d4861a5d0a9e5e7a88497a8c37360 20.000000000000 5884 of 78991 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-14 18:12:51 till 2014-07-15 15:55:06; resolution: 0.01 days)

  • |________*_________________________________________________________________________________________________________________________________________________________________|
  • |__________________________________________________________________________________________________________________________________________________________________*_______|
  • |________________________________________________________________________________________________________________________*_________________________________________________|

3 inputs(s) for total of 30.820000000000 xmr

key image 00: 3465e6764ead647c3f9c61f1e5f0042b6e30e5466b2781c98756f9891cffc52a amount: 0.800000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 387f203cc093490dafb8e117fcddb15e8228ee2491f67eaa362a2592a52db5b7 00128708 1 1/6 2014-07-14 19:12:51 10:121:20:23:42
key image 01: 3b81a4945b5bb06fdff8ebc5b877db3976eb88ca038c050fdaadac855d08c907 amount: 0.020000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 14d7f2e68ae88265a1e82db9a0530d1f8de4de5f523b8adaa14dd4d33bf91aee 00129844 1 21/6 2014-07-15 14:55:06 10:121:00:41:27
key image 02: 901ecf69941a92f6b59a45cf6bd39ab72bb4e7baff085eff1e07dd814fee3305 amount: 30.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6435b83d413625bbd17f0f11bcfed209fcaafd9f390bd4834c4ad7bb7c13c9a2 00129560 1 1/9 2014-07-15 09:35:55 10:121:06:00:38
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 800000000000, "key_offsets": [ 64980 ], "k_image": "3465e6764ead647c3f9c61f1e5f0042b6e30e5466b2781c98756f9891cffc52a" } }, { "key": { "amount": 20000000000, "key_offsets": [ 199134 ], "k_image": "3b81a4945b5bb06fdff8ebc5b877db3976eb88ca038c050fdaadac855d08c907" } }, { "key": { "amount": 30000000000000, "key_offsets": [ 3089 ], "k_image": "901ecf69941a92f6b59a45cf6bd39ab72bb4e7baff085eff1e07dd814fee3305" } } ], "vout": [ { "amount": 10000000000, "target": { "key": "0edd5d01b18bd6ea6d1c3b677fb225c5d895758338de2dd90e0c059ea12318bc" } }, { "amount": 300000000000, "target": { "key": "3a02f00e5d45c6d08818a108d59b13481bde36b3ee9249a85c14b30f7c2d3d73" } }, { "amount": 500000000000, "target": { "key": "c871aa2eb5de0edc0b311bb7f54aca499785421d0c302a5802b4c8967d91b8f3" } }, { "amount": 4000000000000, "target": { "key": "18a373def07f53715851ff043649de44429dad69b37ba6b95c784ed33adcadd5" } }, { "amount": 6000000000000, "target": { "key": "ba134fcc53f1ff1382cfb35155805c3cbe82fb148bdd7a4a8bfe88afdfe88d73" } }, { "amount": 20000000000000, "target": { "key": "deea62c2458a1344de6fddbebd3f102d640d4861a5d0a9e5e7a88497a8c37360" } } ], "extra": [ 1, 9, 170, 241, 230, 13, 215, 126, 161, 92, 80, 133, 53, 205, 188, 112, 37, 244, 4, 82, 198, 103, 85, 245, 81, 165, 49, 97, 215, 39, 197, 64, 9 ], "signatures": [ "68891816ea35aed97f2d48f7e5616f212924590ecbf3c054859153ea7b41f105631475cb705a0e0c19a032a9cbcc47e750e77a5793132091bebcf7e628a7bf0b", "708091e02c3ddd605e4a2e34de2d3228b6e1fe6edd651981b328bce8c4733d0a09017498ace13eb5ae54d3fbb9cb2056d71ac137a537e27f9bc862e276ef8609", "cd91ae91e2b7ef65686c366f328d96c18aadbedefeec4ffec1279b86c112be041dfcda538f4344cea94675415db331ad7f66bb46f565b087a30232e838a3a40c"] }


Less details
source code | moneroexplorer