Monero Transaction fd6abc7e0056a5f75e5321727ba08b7d49c3600b03587231226218319d26634b

Autorefresh is OFF

Tx hash: fd6abc7e0056a5f75e5321727ba08b7d49c3600b03587231226218319d26634b

Tx prefix hash: e0babdcb83d02ba83d5d33c3574e641a43baee3ab134789a7fc78cae22f4a51b
Tx public key: 69f0157308f53cb9af864380fbcbe1cc79c3e213706ed81983d53226a685e29f
Payment id: e34b49f02ecf615d7a3a55424d6deed40c765684707a0fdc1fc798730d6d61ba

Transaction fd6abc7e0056a5f75e5321727ba08b7d49c3600b03587231226218319d26634b was carried out on the Monero network on 2016-09-05 03:35:58. The transaction has 2180672 confirmations. Total output fee is 0.040000000000 XMR.

Timestamp: 1473046558 Timestamp [UTC]: 2016-09-05 03:35:58 Age [y:d:h:m:s]: 08:112:00:15:15
Block: 1129047 Fee (per_kB): 0.040000000000 (0.054540612517) Tx size: 0.7334 kB
Tx version: 1 No of confirmations: 2180672 RingCT/type: no
Extra: 022100e34b49f02ecf615d7a3a55424d6deed40c765684707a0fdc1fc798730d6d61ba0169f0157308f53cb9af864380fbcbe1cc79c3e213706ed81983d53226a685e29f

5 output(s) for total of 5.050000000000 xmr

stealth address amount amount idx tag
00: ef7bbd7a7d4c318be8785f8b659760bfac70c3dba5ee40d145b3d4061a7ad2d2 0.050000000000 239564 of 284522 -
01: 05359dca9a32b0e16b26a6823e67968182a847e4d780f2cf903893652263826f 0.300000000000 860379 of 976536 -
02: ae16b7dbcd90b0a897840cd11e293d74d585f7fa8658a6e99df889d153c491d3 0.700000000000 465136 of 514467 -
03: 681bbd6ebd5c23d6985ca5c922e5b98bac3f17f4fa5af3501e2e8bbc784193ff 1.000000000000 788639 of 874630 -
04: 7e069d7d8b334ffb7aa9a5caeaa742dd2e94f0308f2d675c360fc5d8b9157c53 3.000000000000 270206 of 300495 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-17 08:55:25 till 2016-09-05 03:41:47; resolution: 4.59 days)

  • |_*_______________________________________________*_______________________________________________________________________________________________________________________*|
  • |____*_______________________________________________________________________________________________________*____________________________________________________________*|

2 inputs(s) for total of 5.090000000000 xmr

key image 00: 5b331c515e1eff93d960437e531fb24b48130501135179d1c74cfc5722f52350 amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b2d8d86b33d36d0c46d5865a6853fd1c14aaad665bfe0568eb7123373cd01f57 00132532 1 2/4 2014-07-17 09:55:25 10:162:17:55:48
- 01: 29f4c15cfa3cd937d28f5b8ba1d2b4e566d5502aae946657b520524e6fdc1d85 00455567 0 0/5 2015-02-28 06:05:30 09:301:21:45:43
- 02: 76d068c2e164e6d0d5b38c06af1e9195af987fa55a9554b814949bbd0d2f7517 01128624 3 1/4 2016-09-04 12:44:03 08:112:15:07:10
key image 01: 7532cbbc5ca6b646dd40fcbdd5e3aca07efd946cf104a24e44aa943b9085f2f3 amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 522c27437c6eb694ed01af7223055b41c5e859f3a1e586d481c579165be43271 00157334 1 14/58 2014-08-03 14:12:47 10:145:13:38:26
- 01: e585f3657f4c0a82ee5477435c854440fd3b31e3db7c8a91afe800cf7c64c865 00839670 4 3/142 2015-11-24 09:40:39 09:032:18:10:34
- 02: deadcbec608c8c0b8472dad608f06d41269170fe8dcf16aac4a2f7fa9465e3e0 01129022 3 3/4 2016-09-05 02:41:47 08:112:01:09:26
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 90000000000, "key_offsets": [ 82498, 56909, 111758 ], "k_image": "5b331c515e1eff93d960437e531fb24b48130501135179d1c74cfc5722f52350" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 87102, 104482, 31678 ], "k_image": "7532cbbc5ca6b646dd40fcbdd5e3aca07efd946cf104a24e44aa943b9085f2f3" } } ], "vout": [ { "amount": 50000000000, "target": { "key": "ef7bbd7a7d4c318be8785f8b659760bfac70c3dba5ee40d145b3d4061a7ad2d2" } }, { "amount": 300000000000, "target": { "key": "05359dca9a32b0e16b26a6823e67968182a847e4d780f2cf903893652263826f" } }, { "amount": 700000000000, "target": { "key": "ae16b7dbcd90b0a897840cd11e293d74d585f7fa8658a6e99df889d153c491d3" } }, { "amount": 1000000000000, "target": { "key": "681bbd6ebd5c23d6985ca5c922e5b98bac3f17f4fa5af3501e2e8bbc784193ff" } }, { "amount": 3000000000000, "target": { "key": "7e069d7d8b334ffb7aa9a5caeaa742dd2e94f0308f2d675c360fc5d8b9157c53" } } ], "extra": [ 2, 33, 0, 227, 75, 73, 240, 46, 207, 97, 93, 122, 58, 85, 66, 77, 109, 238, 212, 12, 118, 86, 132, 112, 122, 15, 220, 31, 199, 152, 115, 13, 109, 97, 186, 1, 105, 240, 21, 115, 8, 245, 60, 185, 175, 134, 67, 128, 251, 203, 225, 204, 121, 195, 226, 19, 112, 110, 216, 25, 131, 213, 50, 38, 166, 133, 226, 159 ], "signatures": [ "bd7b40d714d88e9cec11918157a15e60fbc96695c3d9d5e199aacb6e0018140857bc5ca60935f654e9c1a99d34442d94357de5130fbff58b2e056d88143d1405714292e227295c1570cade2c5f2c24051e41c94f7e4bbdeb7d9712f5784117022f6b2c98c70512aa283c0dbb179ea3f2bb77dcf37d670ab4448cd4c449f7f00eae16bc0dc922f97e9985aa5d5e9afd1053a572cab6c45c6ce06cd386ffdef100c410d61b5152ab471959ad08b4757258d8ff3ef40fecc24a2fc25959729edc06", "03625980522c7288b0cf7b04648c485c79dd0f8cd4631da906608dfd5b6014070fc895e30300910670b203ef9e3cab37e80a3a23dd61fe616e2ad944a39d99041867c3ce1a5db2e32d1f4f6f8737329a1c1d48d1716ba6e215f113699892650cac6659a4518e7af84b4fd3f9cc13f57b11c70ac404458616b0e327654db61a0f2cd9a69315cd16ee1cde37285fef4dfd7dc6e856fdd069b05093d98f95346600071379d7e7915239e82633ba2ba51192581b092ea255153bfe6bdf677ec53904"] }


Less details
source code | moneroexplorer