Monero Transaction 050f19544287a1ed86310560ba493439534598ea843717a98d5359cafd1f12a7

Autorefresh is OFF

Tx hash: 050f19544287a1ed86310560ba493439534598ea843717a98d5359cafd1f12a7

Tx prefix hash: 1021ef6ab9552efdd45535fce70d85493f63a97308180566aa7bda2f5df1e5ba
Tx public key: 515b41cc904e7345c3d28e61aac01ce5af3c37345078354113153668e77aa258
Payment id: 464c3a8cebbdbeaa9f0a89ed34fe495792ea0e15f94defbd229c08c68117d3ec

Transaction 050f19544287a1ed86310560ba493439534598ea843717a98d5359cafd1f12a7 was carried out on the Monero network on 2014-06-29 10:42:34. The transaction has 3171836 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1404038554 Timestamp [UTC]: 2014-06-29 10:42:34 Age [y:d:h:m:s]: 10:137:06:39:30
Block: 106652 Fee (per_kB): 0.010000000000 (0.015562310030) Tx size: 0.6426 kB
Tx version: 1 No of confirmations: 3171836 RingCT/type: no
Extra: 022100464c3a8cebbdbeaa9f0a89ed34fe495792ea0e15f94defbd229c08c68117d3ec01515b41cc904e7345c3d28e61aac01ce5af3c37345078354113153668e77aa258

4 output(s) for total of 14.860000000000 xmr

stealth address amount amount idx tag
00: e140124bdb77c1f1c79a6d9e236f944350867dc979c9afe5ea05c6fad5785338 0.060000000000 87428 of 264760 -
01: 0b1f5c72293ef17395a98736af512a27604a8daa238423f2ec89aaaa5ca1b8c4 0.800000000000 34261 of 489955 -
02: 15207986cd480d38ccf929f6995ef8f04633b7b1aedbc79b7a916305d0e5a12a 4.000000000000 16129 of 237197 -
03: 48d9b1eba301723ce4898e8520257381a70e8085ec9fb0748c974afacd501f70 10.000000000000 117664 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-29 09:01:41 till 2014-06-29 11:07:29; resolution: 0.00 days)

  • |_________________________________________________________________________________________*________________________________________________________________________________|
  • |_________________________________________________________________________________*________________________________________________________________________________________|
  • |_________________________________________________________________________________________*________________________________________________________________________________|
  • |_________________________________________________________________________________________*________________________________________________________________________________|

4 inputs(s) for total of 14.870000000000 xmr

key image 00: a0b489152d3716618a79a6c27577150cfd12acefb0ebeea84c6b12aaaeaa02fb amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b4448d3832bae4d41974854df55f26e20e312c04c24b841ab41fd83361aab77b 00106614 1 107/86 2014-06-29 10:07:29 10:137:07:14:35
key image 01: f7680ae652dad5e78c73bba24d2e53ece623cd258e9fe6dc38a3c39496ce481e amount: 0.070000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3654a0b422a4452f1c2ad0ae6d327495faf30e305cfcf050a9dbf52b3ee31660 00106609 1 4/4 2014-06-29 10:01:41 10:137:07:20:23
key image 02: 512f8f2217b7b597a944e0b3190f7d82bc0f092d7bdc9f4f13f1b4e532b8ae5d amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 2a9c4c2b027802d832ca005f6ab893ec377ba57f71b3f25e19b780fa68dfd9f1 00106614 1 107/86 2014-06-29 10:07:29 10:137:07:14:35
key image 03: 378d4a95889542ff549288272cc64cb5ed79ff881ce876b6b701722efe7a9624 amount: 0.800000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: cf83ad44c876351db0a4f825303ad87622a7b8bc5b32a4d8d49e6bd6095f9e58 00106614 1 107/86 2014-06-29 10:07:29 10:137:07:14:35
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 10000000000000, "key_offsets": [ 117617 ], "k_image": "a0b489152d3716618a79a6c27577150cfd12acefb0ebeea84c6b12aaaeaa02fb" } }, { "key": { "amount": 70000000000, "key_offsets": [ 78365 ], "k_image": "f7680ae652dad5e78c73bba24d2e53ece623cd258e9fe6dc38a3c39496ce481e" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 16118 ], "k_image": "512f8f2217b7b597a944e0b3190f7d82bc0f092d7bdc9f4f13f1b4e532b8ae5d" } }, { "key": { "amount": 800000000000, "key_offsets": [ 34231 ], "k_image": "378d4a95889542ff549288272cc64cb5ed79ff881ce876b6b701722efe7a9624" } } ], "vout": [ { "amount": 60000000000, "target": { "key": "e140124bdb77c1f1c79a6d9e236f944350867dc979c9afe5ea05c6fad5785338" } }, { "amount": 800000000000, "target": { "key": "0b1f5c72293ef17395a98736af512a27604a8daa238423f2ec89aaaa5ca1b8c4" } }, { "amount": 4000000000000, "target": { "key": "15207986cd480d38ccf929f6995ef8f04633b7b1aedbc79b7a916305d0e5a12a" } }, { "amount": 10000000000000, "target": { "key": "48d9b1eba301723ce4898e8520257381a70e8085ec9fb0748c974afacd501f70" } } ], "extra": [ 2, 33, 0, 70, 76, 58, 140, 235, 189, 190, 170, 159, 10, 137, 237, 52, 254, 73, 87, 146, 234, 14, 21, 249, 77, 239, 189, 34, 156, 8, 198, 129, 23, 211, 236, 1, 81, 91, 65, 204, 144, 78, 115, 69, 195, 210, 142, 97, 170, 192, 28, 229, 175, 60, 55, 52, 80, 120, 53, 65, 19, 21, 54, 104, 231, 122, 162, 88 ], "signatures": [ "17e4705f2247b041b78bbd1c8803676fa2dce4c16952b8546b2470554919880af7aa4794dfcab221edb18c8e004630c1b8c74758d418ba4e8a2b1ddcfb65940d", "0b06b22bacde896b196fc814080db1eae113f42ba86ebb844afe2e08f8812f0642da5fbdb1bac3923e89c14f71c82790ca88fe17c2693b1fe502486556ddc406", "3151cd1d688e817c9193897383fcc3870abf1b1f4358a6faa19514625c225e01d062500fc5dbbe730b7fc7aff3d95c1caac7cf2aaee386fd10d1d90c1dbd010e", "5f7d439c3bfc72ab7402fe8832ea50ff442c2e9decf364ff52769479e32bbf0edfea96973c1bc0f36a229f44a081e2dd59ff24487790f37905400f8d977bc80f"] }


Less details
source code | moneroexplorer