Monero Transaction 1da68e553a7f66aff88fb0045a53c1fa697ca1c45fe06749da17219696fc580e

Autorefresh is OFF

Tx hash: 1da68e553a7f66aff88fb0045a53c1fa697ca1c45fe06749da17219696fc580e

Tx prefix hash: 558650898c83f6b8851216b6d767479077b28a770d4153d80cf5de30b81a9519
Tx public key: 59d9b9aeff6126f1cacc8aae334efc72f8ccc44c8c24c761601b8f2eefeb22db
Payment id: 55c73a5e185b464090b2845df02878ceebee6d4903b64354ab72be3a6613a4fe

Transaction 1da68e553a7f66aff88fb0045a53c1fa697ca1c45fe06749da17219696fc580e was carried out on the Monero network on 2014-08-10 05:35:01. The transaction has 3143256 confirmations. Total output fee is 0.005328120000 XMR.

Timestamp: 1407648901 Timestamp [UTC]: 2014-08-10 05:35:01 Age [y:d:h:m:s]: 10:139:10:13:38
Block: 166842 Fee (per_kB): 0.005328120000 (0.007907238957) Tx size: 0.6738 kB
Tx version: 1 No of confirmations: 3143256 RingCT/type: no
Extra: 02210055c73a5e185b464090b2845df02878ceebee6d4903b64354ab72be3a6613a4fe0159d9b9aeff6126f1cacc8aae334efc72f8ccc44c8c24c761601b8f2eefeb22db

7 output(s) for total of 5.034671880000 xmr

stealth address amount amount idx tag
00: ba4f0fba6933a41d2f59fecd28c9bb9728644b29b48721913eb8ffdb29bbe445 0.000671880000 0 of 2 -
01: f74095616ffc9c7a994423cdc867a08b626592edf54c04dd96d9ed9a89b104fa 0.006000000000 181387 of 256624 -
02: 418d86ae89add6e9e5772a7050b4438e481fa9aa01fb578958dd751da7f3dbf6 0.008000000000 165305 of 245068 -
03: ffea61f1f2a6e925aaf6b0e9b599f5010c4e38a08e648b6f6c69dda18c50a919 0.010000000000 328324 of 502466 -
04: 6ec1cda8e2c45f298bfb044f3002aa7183e7aafa84020996dc740fc1aa57078a 0.010000000000 328325 of 502466 -
05: 6230e2d719f2b0738df44c42a2050a1d976d47b3306d759d3749a7cb2d8a047b 1.000000000000 178540 of 874630 -
06: 741572e623d5061f43d3630941123f00ca5dc1e419d3b7503bf21c865adeba06 4.000000000000 34900 of 237197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-04 20:33:28 till 2014-08-10 05:23:28; resolution: 0.39 days)

  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |_________________________________________________________________*_______________________________________________________________________________________________________*|

2 inputs(s) for total of 5.040000000000 xmr

key image 00: d147a916e4a2dab3687a931f776a998b31217fe24b49d22de6b8681b1798b3c4 amount: 0.040000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f3d01cccc9281f18104bf2e48f3df64b6ecc34931af93f878fd0e26608ad7ca8 00071002 1 10/52 2014-06-04 21:33:28 10:205:18:15:11
- 01: 44904c385bbdc6eafa6077aa5976d120207d960e0ca048c9dbfb52401386e0a1 00166639 2 2/7 2014-08-10 02:16:55 10:139:13:31:44
key image 01: 28deaa4491485e4b921f542133ab8a4e7de732d094d5828c0e84cc52abe8f256 amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 82b8997cc5f367b779c14277baef3571dc7a639301ca37b8710d6e79dc669e36 00107861 0 0/6 2014-06-30 07:36:58 10:180:08:11:41
- 01: 859ddfbdb29ae2063dca3792790708247e89a20092f081945362dfb6dc4319ff 00166759 0 0/5 2014-08-10 04:23:28 10:139:11:25:11
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 40000000000, "key_offsets": [ 31188, 101320 ], "k_image": "d147a916e4a2dab3687a931f776a998b31217fe24b49d22de6b8681b1798b3c4" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 26801, 71869 ], "k_image": "28deaa4491485e4b921f542133ab8a4e7de732d094d5828c0e84cc52abe8f256" } } ], "vout": [ { "amount": 671880000, "target": { "key": "ba4f0fba6933a41d2f59fecd28c9bb9728644b29b48721913eb8ffdb29bbe445" } }, { "amount": 6000000000, "target": { "key": "f74095616ffc9c7a994423cdc867a08b626592edf54c04dd96d9ed9a89b104fa" } }, { "amount": 8000000000, "target": { "key": "418d86ae89add6e9e5772a7050b4438e481fa9aa01fb578958dd751da7f3dbf6" } }, { "amount": 10000000000, "target": { "key": "ffea61f1f2a6e925aaf6b0e9b599f5010c4e38a08e648b6f6c69dda18c50a919" } }, { "amount": 10000000000, "target": { "key": "6ec1cda8e2c45f298bfb044f3002aa7183e7aafa84020996dc740fc1aa57078a" } }, { "amount": 1000000000000, "target": { "key": "6230e2d719f2b0738df44c42a2050a1d976d47b3306d759d3749a7cb2d8a047b" } }, { "amount": 4000000000000, "target": { "key": "741572e623d5061f43d3630941123f00ca5dc1e419d3b7503bf21c865adeba06" } } ], "extra": [ 2, 33, 0, 85, 199, 58, 94, 24, 91, 70, 64, 144, 178, 132, 93, 240, 40, 120, 206, 235, 238, 109, 73, 3, 182, 67, 84, 171, 114, 190, 58, 102, 19, 164, 254, 1, 89, 217, 185, 174, 255, 97, 38, 241, 202, 204, 138, 174, 51, 78, 252, 114, 248, 204, 196, 76, 140, 36, 199, 97, 96, 27, 143, 46, 239, 235, 34, 219 ], "signatures": [ "b4bb763d07b38b44277a0de4095c2e1c500b471c8d2d4465ffb1b8ba43c26400b6725c69b3bf8dd7dadf08a6da1575097f62aa9972c5aea0689d8df2ef18140cb87e9377d16fcfd3ced33a2024ff9a54be7efb48de13831c025a6d960352a5061dac8ae128948b8bb406f43c3d5e62e2ea48b6431cef3ec8f55d92c66923780e", "67b98f98acfe63c633f123b729aaf825c4aa34e420e89356a23cb5239200c30270933c4b2c5edbbe12b26dd6c29093421e9943b16667df782fd33070e6f5b1032a0929e163577c30f8c0e07379425b6341be8ff363b14fd0567df7110ca96d0dcd3d28377d35e52fb46c64d1791436f67a36dc2d9437e387f52002c8672d770e"] }


Less details
source code | moneroexplorer