Monero Transaction 055f26cc7415798b923ba92417def3366c0fa84e8ff138aa85485c3f3a20c85b

Autorefresh is OFF

Tx hash: 055f26cc7415798b923ba92417def3366c0fa84e8ff138aa85485c3f3a20c85b

Tx prefix hash: 043e83e2af41dabf492d780b709d42fe9f7a5bf11b8f46809e58bc7447bbdbdd
Tx public key: e104d94e989475120c89b18a032543d535acf884ce138d52391d82df506c3d66

Transaction 055f26cc7415798b923ba92417def3366c0fa84e8ff138aa85485c3f3a20c85b was carried out on the Monero network on 2014-06-16 12:43:39. The transaction has 3153749 confirmations. Total output fee is 0.014651250000 XMR.

Timestamp: 1402922619 Timestamp [UTC]: 2014-06-16 12:43:39 Age [y:d:h:m:s]: 10:099:00:45:28
Block: 87890 Fee (per_kB): 0.014651250000 (0.021101097046) Tx size: 0.6943 kB
Tx version: 1 No of confirmations: 3153749 RingCT/type: no
Extra: 01e104d94e989475120c89b18a032543d535acf884ce138d52391d82df506c3d66

9 output(s) for total of 29.986238750000 xmr

stealth address amount amount idx tag
00: 279e44fa143dfa54ab91228dc8dbcf6427eecde1dbec6fabe87a74ddc3d527c5 0.006238750000 0 of 1 -
01: a9af924195207e26875ef67b40e3e18d831a5119e78021d8e346d1ecb047ca7f 0.040000000000 90672 of 294095 -
02: eb8225b285785769cfc2d55e47a5a088c93d3ea828cdfee9e5a13542a7c76455 0.040000000000 90673 of 294095 -
03: 850807c5b457e257dfc66fa1dee6c9876e1d72ee06bd7d99e3a9009bfd254746 0.200000000000 57918 of 1272210 -
04: e535c9340e428578e3fa557d3c0c660170361a727a2ca03c3219db4251c66466 0.700000000000 20179 of 514466 -
05: a0bc04c8bc397c096a41185109af3c309c72e946dfc430dffc25c7c9c8bc9de5 1.000000000000 25458 of 874629 -
06: 12138d298bba031603b778914c58b66f98e62492584a8e1262ea57aaf1064510 8.000000000000 4495 of 226902 -
07: 61c95301838ed72fef661a751dbaae75b868321386aec7de82bed0ec979dabc6 10.000000000000 92723 of 921411 -
08: f5cda482c9173e8998a62de95f870211b5637902959b7d9bd5e06492264451cc 10.000000000000 92724 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-05 06:59:47 till 2014-06-14 02:33:58; resolution: 0.05 days)

  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_____________________________________________________________________________________________________________________________________________________________________*____|

3 inputs(s) for total of 30.000890000000 xmr

key image 00: 02da556a7e5f28d6a8a83cf5969fab5af25102f1660152d55803ebc68515f098 amount: 0.000890000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9412e379d1f9adea00d94ad50091180a886511e5841c556cbcc7f2f45bb22d70 00084244 1 1/33 2014-06-14 01:33:58 10:101:11:55:09
key image 01: 1d9f36725ec75c945eb75a1f985f15b813525a9087e661374642697ab2a9e111 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 321f6861a6de8be669bb90f0fe068b3790c8df844cf32759d97e02bbfb21bb4c 00071605 1 26/4 2014-06-05 07:59:47 10:110:05:29:20
key image 02: 95eea56f8a089343f8ffa5d7bc9695e98d884eaccaf660e41ec8fcb6cb4cb91b amount: 20.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: fcde790a7c4732b27374874238b07e09e1b2eb9234093658494efbb68273a63a 00083942 1 5/7 2014-06-13 20:20:11 10:101:17:08:56
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 890000000, "key_offsets": [ 1614 ], "k_image": "02da556a7e5f28d6a8a83cf5969fab5af25102f1660152d55803ebc68515f098" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 73050 ], "k_image": "1d9f36725ec75c945eb75a1f985f15b813525a9087e661374642697ab2a9e111" } }, { "key": { "amount": 20000000000000, "key_offsets": [ 1794 ], "k_image": "95eea56f8a089343f8ffa5d7bc9695e98d884eaccaf660e41ec8fcb6cb4cb91b" } } ], "vout": [ { "amount": 6238750000, "target": { "key": "279e44fa143dfa54ab91228dc8dbcf6427eecde1dbec6fabe87a74ddc3d527c5" } }, { "amount": 40000000000, "target": { "key": "a9af924195207e26875ef67b40e3e18d831a5119e78021d8e346d1ecb047ca7f" } }, { "amount": 40000000000, "target": { "key": "eb8225b285785769cfc2d55e47a5a088c93d3ea828cdfee9e5a13542a7c76455" } }, { "amount": 200000000000, "target": { "key": "850807c5b457e257dfc66fa1dee6c9876e1d72ee06bd7d99e3a9009bfd254746" } }, { "amount": 700000000000, "target": { "key": "e535c9340e428578e3fa557d3c0c660170361a727a2ca03c3219db4251c66466" } }, { "amount": 1000000000000, "target": { "key": "a0bc04c8bc397c096a41185109af3c309c72e946dfc430dffc25c7c9c8bc9de5" } }, { "amount": 8000000000000, "target": { "key": "12138d298bba031603b778914c58b66f98e62492584a8e1262ea57aaf1064510" } }, { "amount": 10000000000000, "target": { "key": "61c95301838ed72fef661a751dbaae75b868321386aec7de82bed0ec979dabc6" } }, { "amount": 10000000000000, "target": { "key": "f5cda482c9173e8998a62de95f870211b5637902959b7d9bd5e06492264451cc" } } ], "extra": [ 1, 225, 4, 217, 78, 152, 148, 117, 18, 12, 137, 177, 138, 3, 37, 67, 213, 53, 172, 248, 132, 206, 19, 141, 82, 57, 29, 130, 223, 80, 108, 61, 102 ], "signatures": [ "d9487407d4f1ebb3315135d17ea165e89e411f497bdfeff6468ff93419d7f907937b20b7a04c2af41b43924246163337b462bc6de92caec7e6eae93b6eaa0709", "2039f937b88f2da63e8781e02e07620e23da998fc247150b9af61abacfa99f05f0a8ddda8449a0d249846469a9e3fe9524cac6c3ef519d84b0801c2788842004", "be528c11adb5a0856bfe9cfed92093e84569f380f03270e675a5cc94f96cd102f183978f614ff0dd155368be18d17b39983887fb9cf874ac6fd0fbd30cce9b00"] }


Less details
source code | moneroexplorer