Monero Transaction fbdda51e43b895f14020b7e4896d38a982b8182535d8bc67c1abce23106b8bf4

Autorefresh is OFF

Tx hash: fbdda51e43b895f14020b7e4896d38a982b8182535d8bc67c1abce23106b8bf4

Tx prefix hash: 34a63eb476789941164e15c2de5a794b09090dd64eba51372d7a735fa992e6b0
Tx public key: a82345d1676638a6d6fd0ff370d253d6eac9c836aa23250e704163b6c261c5a4
Payment id: 12a99b5e223c376f052e891ffdfc77fb211998dffb53d5972cff084de2e290bc

Transaction fbdda51e43b895f14020b7e4896d38a982b8182535d8bc67c1abce23106b8bf4 was carried out on the Monero network on 2015-09-08 06:01:49. The transaction has 2570897 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1441692109 Timestamp [UTC]: 2015-09-08 06:01:49 Age [y:d:h:m:s]: 09:097:17:17:34
Block: 730026 Fee (per_kB): 0.100000000000 (0.116628701595) Tx size: 0.8574 kB
Tx version: 1 No of confirmations: 2570897 RingCT/type: no
Extra: 01a82345d1676638a6d6fd0ff370d253d6eac9c836aa23250e704163b6c261c5a402210012a99b5e223c376f052e891ffdfc77fb211998dffb53d5972cff084de2e290bc

7 output(s) for total of 72.660007187121 xmr

stealth address amount amount idx tag
00: c93a18a18ed7b3c089a0edb99775c9415ab9c2d6feaa665e549ca7c7b0f9e611 3.000000000000 208702 of 300495 -
01: f811092a9b336b1b2c21f26f79922d81f517fe420b147080cb41d8bb925973cc 10.000000000000 692385 of 921411 -
02: a0e18ad5749e941f9f9da01f1d07cecf03351ef40a635c7e53dd905977aea6c9 0.000007187121 1 of 2 -
03: aba7573c94edfc45ad5a4a66569fc1d74f811405388a2056b572ca39e4b7ed15 0.060000000000 162303 of 264760 -
04: 482535b62ee47f1ff3a558b1f2e5ac0c127707c58c8ee683a3f87354e636e55f 0.600000000000 478479 of 650760 -
05: b0fc57093aa38abf1ac0d43511b9a1e8cceea5601580e3f9818c26c734697411 9.000000000000 165897 of 274259 -
06: cfae09252a23641fea197d15b552db2557273f56d972b4ecf9416b59b40aa086 50.000000000000 18966 of 44703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-09-06 09:12:12 till 2015-09-07 17:20:22; resolution: 0.01 days)

  • |_______*__________________________________________________________________________________________________________________________________________________________________|
  • |____________________________________________________________________________________________________________________________________________________________________*_____|
  • |___________________________________________________________________________________________________________________________*______________________________________________|
  • |______*___________________________________________________________________________________________________________________________________________________________________|
  • |_____________________________________________________________________________*____________________________________________________________________________________________|

5 inputs(s) for total of 72.760007187121 xmr

key image 00: 44dd916947b308183f321f11df63e1100c78d86d5998e539f846b76150dc39e2 amount: 0.060000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3ecd6ff501d4fa2d4e4d05a1f4d7c86ea06af12a822fd60f8a1638bd4968e530 00727437 1 12/9 2015-09-06 10:21:33 09:099:12:57:50
key image 01: 23490ee36cfbc3828888b87af64289d4caba7378e25b4994c24a5838d4ca7163 amount: 0.000007187121
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 43eb7ffabea287e65356759c20869c87d082794ed722ee3fb61aac687bd99021 00729296 1 4/10 2015-09-07 16:20:22 09:098:06:59:01
key image 02: 4519a114d97ce524e6f0e4b2ec5eb29ab0ab3dc8ef62ee914408a482f7e4e74a amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3015a1b4f77eb9220e291998840acaf3e344ab6b62eecc6c61decbf1882daf54 00728735 1 3/9 2015-09-07 08:30:53 09:098:14:48:30
key image 03: 9beb2a6d623992fa637875c1abf5df2e5bea8b6e6a288749bab5fa56648e06cc amount: 0.700000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0f0ac9250823059828142f23e5cd06a27cc2bf26cf7d16a8593fd61433d4b223 00727449 1 3/8 2015-09-06 10:12:12 09:099:13:07:11
key image 04: 8b6f1e45fd00fe21a6767d50a04b70adaa36925d0babd302d16884736b383554 amount: 70.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 829ac9de38769308f4474b5c331978ef9357c9b7a08127c353dd938127c99676 00728211 1 2/5 2015-09-06 23:45:43 09:098:23:33:40
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 60000000000, "key_offsets": [ 162162 ], "k_image": "44dd916947b308183f321f11df63e1100c78d86d5998e539f846b76150dc39e2" } }, { "key": { "amount": 7187121, "key_offsets": [ 0 ], "k_image": "23490ee36cfbc3828888b87af64289d4caba7378e25b4994c24a5838d4ca7163" } }, { "key": { "amount": 2000000000000, "key_offsets": [ 293028 ], "k_image": "4519a114d97ce524e6f0e4b2ec5eb29ab0ab3dc8ef62ee914408a482f7e4e74a" } }, { "key": { "amount": 700000000000, "key_offsets": [ 352596 ], "k_image": "9beb2a6d623992fa637875c1abf5df2e5bea8b6e6a288749bab5fa56648e06cc" } }, { "key": { "amount": 70000000000000, "key_offsets": [ 8919 ], "k_image": "8b6f1e45fd00fe21a6767d50a04b70adaa36925d0babd302d16884736b383554" } } ], "vout": [ { "amount": 3000000000000, "target": { "key": "c93a18a18ed7b3c089a0edb99775c9415ab9c2d6feaa665e549ca7c7b0f9e611" } }, { "amount": 10000000000000, "target": { "key": "f811092a9b336b1b2c21f26f79922d81f517fe420b147080cb41d8bb925973cc" } }, { "amount": 7187121, "target": { "key": "a0e18ad5749e941f9f9da01f1d07cecf03351ef40a635c7e53dd905977aea6c9" } }, { "amount": 60000000000, "target": { "key": "aba7573c94edfc45ad5a4a66569fc1d74f811405388a2056b572ca39e4b7ed15" } }, { "amount": 600000000000, "target": { "key": "482535b62ee47f1ff3a558b1f2e5ac0c127707c58c8ee683a3f87354e636e55f" } }, { "amount": 9000000000000, "target": { "key": "b0fc57093aa38abf1ac0d43511b9a1e8cceea5601580e3f9818c26c734697411" } }, { "amount": 50000000000000, "target": { "key": "cfae09252a23641fea197d15b552db2557273f56d972b4ecf9416b59b40aa086" } } ], "extra": [ 1, 168, 35, 69, 209, 103, 102, 56, 166, 214, 253, 15, 243, 112, 210, 83, 214, 234, 201, 200, 54, 170, 35, 37, 14, 112, 65, 99, 182, 194, 97, 197, 164, 2, 33, 0, 18, 169, 155, 94, 34, 60, 55, 111, 5, 46, 137, 31, 253, 252, 119, 251, 33, 25, 152, 223, 251, 83, 213, 151, 44, 255, 8, 77, 226, 226, 144, 188 ], "signatures": [ "35d5257854405925bfc4f6c79e979f53a267076aad1f483c0d58f180bf3c46013a7bea9f43f6628d84a03c24c98c747cf5880e1167f2041aaef18c78fa04c10e", "bdd61c631073cd06eb5a76e52013de66a95699f4510c8aafb5db7920cce8d70ad7b844b0c7f5e065efb3429d1070b28097b46a663c562968968305e3da3a2604", "b31269ac570a393105e6d77813a7622a657343e3e51c7f46580da2046a02e003d20b1dc09175363638fc6efe5499615d76f00058603952d65f609b93ed768e0d", "7b363a7b341a25fa9c10a34d972940c52473513fde7ce07bc5c737381cb6ec0feb06d8f2fa5aaf07f8227a1881d857f3c779039aa80287a8b31f53ece759dd0a", "b5c4e9d48fdbe4904d30cb4fd5f30a18e247c3cd8965fdf33dfc86fb45f3410c8cff35f25c69bc41d41d5d06c423ce1d41f2cd6e9a9939e69767e73dee2f6202"] }


Less details
source code | moneroexplorer