Monero Transaction fdd7a0e1f219529a4353d1528a78f6f494eaea076f05bc9629706d2c82e11d18

Autorefresh is OFF

Tx hash: fdd7a0e1f219529a4353d1528a78f6f494eaea076f05bc9629706d2c82e11d18

Tx prefix hash: 2879b928fb1535a5d4ba7d3a75f31621e435e9cdc7a08924a8fa68191472bfb1
Tx public key: d5e2a8ac0d664dbdf84a5bb57040907d2bd451effd55d7eb96de4e44953ea552

Transaction fdd7a0e1f219529a4353d1528a78f6f494eaea076f05bc9629706d2c82e11d18 was carried out on the Monero network on 2015-09-30 02:38:28. The transaction has 2532728 confirmations. Total output fee is 0.026132802201 XMR.

Timestamp: 1443580708 Timestamp [UTC]: 2015-09-30 02:38:28 Age [y:d:h:m:s]: 09:066:00:57:34
Block: 761150 Fee (per_kB): 0.026132802201 (0.038338093773) Tx size: 0.6816 kB
Tx version: 1 No of confirmations: 2532728 RingCT/type: no
Extra: 01d5e2a8ac0d664dbdf84a5bb57040907d2bd451effd55d7eb96de4e44953ea552

6 output(s) for total of 9.082208250000 xmr

stealth address amount amount idx tag
00: 3631ffec63f5c23d551b5c10231526610a7af00cae30a61a2bf955a0fa18f5b7 0.002208250000 0 of 1 -
01: 652ecbe03d93f083dc1c488ddec83587be153253461c540dfca39d31048c88f9 0.040000000000 195154 of 294095 -
02: 50eae317f44c1876d89f741e2e24fb77671329b3b84942406826cdce8d2eb40d 0.040000000000 195155 of 294095 -
03: deeefc54bd813e4dd9528eed07c75a707b7eba25d1c00507221ea458f2286a23 0.500000000000 855681 of 1118624 -
04: 2dae904d5c570539f6aa22f97dffeda25d5ee4dac7b35a3b3e67205b47cd6666 0.500000000000 855682 of 1118624 -
05: bf05b886ceb0e6d3a0bf3bae4d016f157052a59f37fea06cebf0e7a7ba166d8e 8.000000000000 105692 of 226902 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-09-22 00:58:13 till 2015-09-27 16:40:00; resolution: 0.03 days)

  • |__*_______________________________________________________________________________________________________________________________________________________________________|
  • |________________________________________________________________________________________________________________________________________*_________________________________|
  • |________________________________________________________________________________________________________________________________________________________________________*_|
  • |_________________________________*________________________________________________________________________________________________________________________________________|

4 inputs(s) for total of 9.108341052201 xmr

key image 00: 96265dc6d7d28480986297709b28d4ef937f3bf4e4265d006c45b2c95719c60e amount: 0.008341052201
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 28bffe7425fa773fc2e8a644ae183c0d91721b5e4c555899c4d4b62e3ec1167e 00749709 0 0/4 2015-09-22 01:58:13 09:074:01:37:49
key image 01: 45e16acf47b21521281f4cc81715649d5f4137d947ffde6b890c371709115127 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7d5ecef1b833a639a4679971943fa387c57e354a9029dcdd7adb2041ed76f94a 00756211 0 0/4 2015-09-26 13:52:22 09:069:13:43:40
key image 02: 7d1680af3bc2961737c087955d10d09e0f417356cf3f4e875fb1613a8caea7b7 amount: 8.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 84575a81c1b256679f9d99063f9dc7b3d7e2b79546725bbf52cfe7fb8f6053fe 00757738 0 0/4 2015-09-27 15:40:00 09:068:11:56:02
key image 03: 25eb04c3a0da42001e499aa87402960cbc429899c1dd7eccfe2738308ca08f85 amount: 0.600000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8434e38cfb703f9e990000965f46ae5326e5e1ff1b82a035fd433aaf6ceb35bd 00751160 0 0/4 2015-09-23 03:05:05 09:073:00:30:57
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 8341052201, "key_offsets": [ 0 ], "k_image": "96265dc6d7d28480986297709b28d4ef937f3bf4e4265d006c45b2c95719c60e" } }, { "key": { "amount": 500000000000, "key_offsets": [ 849265 ], "k_image": "45e16acf47b21521281f4cc81715649d5f4137d947ffde6b890c371709115127" } }, { "key": { "amount": 8000000000000, "key_offsets": [ 101849 ], "k_image": "7d1680af3bc2961737c087955d10d09e0f417356cf3f4e875fb1613a8caea7b7" } }, { "key": { "amount": 600000000000, "key_offsets": [ 491718 ], "k_image": "25eb04c3a0da42001e499aa87402960cbc429899c1dd7eccfe2738308ca08f85" } } ], "vout": [ { "amount": 2208250000, "target": { "key": "3631ffec63f5c23d551b5c10231526610a7af00cae30a61a2bf955a0fa18f5b7" } }, { "amount": 40000000000, "target": { "key": "652ecbe03d93f083dc1c488ddec83587be153253461c540dfca39d31048c88f9" } }, { "amount": 40000000000, "target": { "key": "50eae317f44c1876d89f741e2e24fb77671329b3b84942406826cdce8d2eb40d" } }, { "amount": 500000000000, "target": { "key": "deeefc54bd813e4dd9528eed07c75a707b7eba25d1c00507221ea458f2286a23" } }, { "amount": 500000000000, "target": { "key": "2dae904d5c570539f6aa22f97dffeda25d5ee4dac7b35a3b3e67205b47cd6666" } }, { "amount": 8000000000000, "target": { "key": "bf05b886ceb0e6d3a0bf3bae4d016f157052a59f37fea06cebf0e7a7ba166d8e" } } ], "extra": [ 1, 213, 226, 168, 172, 13, 102, 77, 189, 248, 74, 91, 181, 112, 64, 144, 125, 43, 212, 81, 239, 253, 85, 215, 235, 150, 222, 78, 68, 149, 62, 165, 82 ], "signatures": [ "6ed3768fd25b0c137fc90e048ec3e2be2ccca70c4ade571158d9ee91a09f700ef71c6365892abcb4933649273f578553a0440ef34c1c9c45876532eaa41d2304", "1fb71ce9efce5a677bde90b41412c170776b4ef3dadf1cca0d98f0a60bcae1023a559f59a9cad4444802743bc3da18fdb9a58ed4c4ece323701be4ed2b0c1e0f", "c4821d8a9952abb1483e5d59c8e0188fee6879762e30b4cc9db0ae03765e0e0d0f1b73dec98bb6ffa2a24b71d65792903bcad806c042f7b719e3023ff4d00101", "3acff40ce8c499a86b1ccbbcd959dc3685ddeb3a2343f371b416ae9ddcef7a064522be20b6b276363cd627bcf69510c1a84532f519aef45c0f204dd6e1389a00"] }


Less details
source code | moneroexplorer