Monero Transaction 05da5061b863312327593661105b96099c7d4f8487f56d5c8d21e2b69d596ad9

Autorefresh is OFF

Tx hash: 05da5061b863312327593661105b96099c7d4f8487f56d5c8d21e2b69d596ad9

Tx prefix hash: bda41b24ab2acce9c4985ec37b0fd421a3ac6c01a7369244d62524a0ba3dc52e
Tx public key: 3e61ec8e0929cf4fc7b7fc1a7161e6aed1da069e5d66075dbc3c5486871aac67
Payment id: df452df6ee1045e19035800c887db0962d60f17ffc014ed8a6b7e2de31cc01d4

Transaction 05da5061b863312327593661105b96099c7d4f8487f56d5c8d21e2b69d596ad9 was carried out on the Monero network on 2014-07-14 05:17:42. The transaction has 3150597 confirmations. Total output fee is 0.007221386868 XMR.

Timestamp: 1405315062 Timestamp [UTC]: 2014-07-14 05:17:42 Age [y:d:h:m:s]: 10:122:11:17:34
Block: 127855 Fee (per_kB): 0.007221386868 (0.008393530253) Tx size: 0.8604 kB
Tx version: 1 No of confirmations: 3150597 RingCT/type: no
Extra: 022100df452df6ee1045e19035800c887db0962d60f17ffc014ed8a6b7e2de31cc01d4013e61ec8e0929cf4fc7b7fc1a7161e6aed1da069e5d66075dbc3c5486871aac67

7 output(s) for total of 14.422778613132 xmr

stealth address amount amount idx tag
00: 7e8a4fe42d0b847efacc9888a422a2af90c8050a61e4e1a05a0fe5a09e079fa5 0.002778613132 0 of 1 -
01: f685c13ef3657c1832a17da218a392564a9933bb2b4633f2f10923dc2108d676 0.050000000000 104690 of 284521 -
02: 5816fb8106a6a4fce05477a3fb6acc407bf04f6c22558b1986349fc00053c117 0.070000000000 82512 of 263947 -
03: b8e652990dc20199c88c9165f8a4fbae0c7acd61fcfd2ac8143c4b7c18ccb620 0.400000000000 84252 of 688584 -
04: e91688a238dc9f2d559aa66b9acd5f6c59cd9f27f7e22e6dfa81bd0bb571972a 0.900000000000 53687 of 454894 -
05: 0a52ee77ff7990c7499833aecf85596a871c9d2d45bff8a6e3718fb2148881d3 4.000000000000 22509 of 237197 -
06: 9eedad6bf22e94a9914679287fedf141c3b89bc8356920658609358064c4597b 9.000000000000 10681 of 274259 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-12 08:29:51 till 2014-07-14 05:51:13; resolution: 0.01 days)

  • |____*_____________________________________________________________________________________________________________________________________________________________________|
  • |__________________________________________________________________________________________________________________________________________________________________*_______|
  • |________________________________________________________________________________*_________________________________________________________________________________________|
  • |__________________________________________________________________________________________________________________________________________________________________*_______|
  • |______________________________________________________________________________________________________________________________________________________________________*___|

5 inputs(s) for total of 14.430000000000 xmr

key image 00: b6ed902befe4fc4d0921405810f4bfff943688ec3c575af0cf69059d371dddad amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ea3974cea135ed93d3f1a2432797054658d3645c0bb9f9544dd5fd946be9b2ac 00125231 1 2/3 2014-07-12 09:29:51 10:124:07:05:25
key image 01: 7c74f5d93d0ed9f93be86b744ab8b01c87cbd2354d4e152eb31178311c5cc598 amount: 0.400000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 443b99b814c76386efe0c7caadac60bc6bb53df8a59bb58ab1aa2b8d20d880a5 00127765 1 4/7 2014-07-14 03:56:24 10:122:12:38:52
key image 02: a95669ddafb99f4ff9e752d1fc8f4e244483ba173737b3344c76ea13acbf5817 amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1911bce81407b4059c3be41621478be1e46b256685fb83729386220223d86989 00126462 1 2/7 2014-07-13 05:48:46 10:123:10:46:30
key image 03: 8eb0386c5e907a314cc6f524fbaa85dd854d0a8735ae1a10f8ce03cc2fec0414 amount: 0.030000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 01d36838e068fdf43379b47831db5f81d89c0a0b4dc96fd821b3b26711d509d3 00127761 1 4/9 2014-07-14 03:53:12 10:122:12:42:04
key image 04: 81a5c92d331efa2d8b68de8469f6253d58234bd0a3735f4f27178a2fb8835455 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: cb27a396a6f29e4c0144ac4011c4c2dcd7cb22f45fdb0e3f133d401d3a0b3adc 00127827 1 8/11 2014-07-14 04:51:13 10:122:11:44:03
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 2000000000000, "key_offsets": [ 39548 ], "k_image": "b6ed902befe4fc4d0921405810f4bfff943688ec3c575af0cf69059d371dddad" } }, { "key": { "amount": 400000000000, "key_offsets": [ 84156 ], "k_image": "7c74f5d93d0ed9f93be86b744ab8b01c87cbd2354d4e152eb31178311c5cc598" } }, { "key": { "amount": 2000000000000, "key_offsets": [ 40401 ], "k_image": "a95669ddafb99f4ff9e752d1fc8f4e244483ba173737b3344c76ea13acbf5817" } }, { "key": { "amount": 30000000000, "key_offsets": [ 147950 ], "k_image": "8eb0386c5e907a314cc6f524fbaa85dd854d0a8735ae1a10f8ce03cc2fec0414" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 143854 ], "k_image": "81a5c92d331efa2d8b68de8469f6253d58234bd0a3735f4f27178a2fb8835455" } } ], "vout": [ { "amount": 2778613132, "target": { "key": "7e8a4fe42d0b847efacc9888a422a2af90c8050a61e4e1a05a0fe5a09e079fa5" } }, { "amount": 50000000000, "target": { "key": "f685c13ef3657c1832a17da218a392564a9933bb2b4633f2f10923dc2108d676" } }, { "amount": 70000000000, "target": { "key": "5816fb8106a6a4fce05477a3fb6acc407bf04f6c22558b1986349fc00053c117" } }, { "amount": 400000000000, "target": { "key": "b8e652990dc20199c88c9165f8a4fbae0c7acd61fcfd2ac8143c4b7c18ccb620" } }, { "amount": 900000000000, "target": { "key": "e91688a238dc9f2d559aa66b9acd5f6c59cd9f27f7e22e6dfa81bd0bb571972a" } }, { "amount": 4000000000000, "target": { "key": "0a52ee77ff7990c7499833aecf85596a871c9d2d45bff8a6e3718fb2148881d3" } }, { "amount": 9000000000000, "target": { "key": "9eedad6bf22e94a9914679287fedf141c3b89bc8356920658609358064c4597b" } } ], "extra": [ 2, 33, 0, 223, 69, 45, 246, 238, 16, 69, 225, 144, 53, 128, 12, 136, 125, 176, 150, 45, 96, 241, 127, 252, 1, 78, 216, 166, 183, 226, 222, 49, 204, 1, 212, 1, 62, 97, 236, 142, 9, 41, 207, 79, 199, 183, 252, 26, 113, 97, 230, 174, 209, 218, 6, 158, 93, 102, 7, 93, 188, 60, 84, 134, 135, 26, 172, 103 ], "signatures": [ "622a706bab1b0999aed3a798fe3f12ac178cd412ccc7bc668681fbf1fdb23e081adc923dbf7c46b5ca1cc636e51153ad46ece60acef954aca60e762689463c09", "78e06e704dd242b97bb47f5c6276db95cd0da8653bff24bdd2336336039e9b04f20bb9dafb0093547acb4aba5116b800dd071aca037bbda238035c138ccb3b05", "ebd69114cd0b7dbede5705107e4ee7eac9a0a9d9d934abb3b90960093b67690cb168b1c40a1560b235a7e9c519099e3812151db5af9baf71ea8ed8abe10bf50f", "6118d271d80ba9430629339431eff37a68127ccf7591b00105d491c9a98a3d084fbd8ac52744a1fa81ab7cbaabb7638d2da70406c47d6f10e395ab33c965d203", "cd644adfb1de43e2db0732dc313162b57800992e9c96702daa878c1e14ed250f7d0c521c046d704af950aaf9c092835cd85b5239cea749aa9b73264e589f610f"] }


Less details
source code | moneroexplorer