Monero Transaction 2c5e4259398d7ba2bfa2bfa95ffed908aa4250312e141f74be9e9b2cfdd16aec

Autorefresh is OFF

Tx hash: 2c5e4259398d7ba2bfa2bfa95ffed908aa4250312e141f74be9e9b2cfdd16aec

Tx prefix hash: 060abcec621cb76e29c3b5a3c9c4c00f4377f4aebd327456202543f3205867f6
Tx public key: ee46a256ed622993d8023eb98b4862ca51c3fa7fac3393044d89399171cf10cd

Transaction 2c5e4259398d7ba2bfa2bfa95ffed908aa4250312e141f74be9e9b2cfdd16aec was carried out on the Monero network on 2014-06-04 23:09:53. The transaction has 3171433 confirmations. Total output fee is 0.005820444472 XMR.

Timestamp: 1401923393 Timestamp [UTC]: 2014-06-04 23:09:53 Age [y:d:h:m:s]: 10:111:21:13:16
Block: 71128 Fee (per_kB): 0.005820444472 (0.006995463779) Tx size: 0.8320 kB
Tx version: 1 No of confirmations: 3171433 RingCT/type: no
Extra: 01ee46a256ed622993d8023eb98b4862ca51c3fa7fac3393044d89399171cf10cd

10 output(s) for total of 16.026045121152 xmr

stealth address amount amount idx tag
00: d14cdfa89758fc20227e3471df498fa696685264a67a8b2de06f234c322b0ae4 0.000832478320 0 of 1 -
01: 4a86011044c45b97e3566a906f6d474c6ae67b4069bd9bf13500f0eed1974b59 0.002212642832 0 of 1 -
02: 37efbc8a0ad492646e787136f05e25ad04a55e79cf0e3af8c540748df19396fa 0.005000000000 47710 of 308584 -
03: 0a51eeffe3d2b15e342fed9538e4ebe2cc626dcfe5141b1f8eef88fab44d3fe4 0.008000000000 41350 of 245067 -
04: 609777b277a67bbcece6d40954f94bfe706db533918860368c62ec2c546a340a 0.050000000000 27181 of 284520 -
05: c4a588266f364e89fc1bb0ae62f88a7dc021f10ac446653a53c5971bb7827afc 0.060000000000 24255 of 264760 -
06: d9c366d41287654af2da64312a49499e380795f6c795a458089306e5b924f01c 0.100000000000 36490 of 982315 -
07: 90072f85ff723a7907d2370962a39ac7ea544ff975c97cb6eae50f6f72f2d38a 0.800000000000 10960 of 489955 -
08: a1f7f3cd8cbfbb3bd25bc683b3c435c89ad1a63461addde4c64167f17a34cd9c 5.000000000000 4473 of 255089 -
09: 0c3b19e34faee8fbe129b63df623f5083a6e56cd88b95838f2c41343eb4da342 10.000000000000 72418 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-04 19:55:05 till 2014-06-05 00:02:41; resolution: 0.00 days)

  • |_________________________________________*________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________*________________________________________|
  • |_______________________________________________________________________________________________________*__________________________________________________________________|
  • |_______________________________________________________________________________________________________*__________________________________________________________________|

4 inputs(s) for total of 16.031865565624 xmr

key image 00: 54bd4a3ba94e9e4e97a4696f0df05e404f88817e0020b33ab43ee3cd1216e5a9 amount: 0.001865565624
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: aec64647141117ced18d5abd33691cdb9a0e87c4c2da7d7dad5b75399a11f24f 00070961 0 0/5 2014-06-04 20:55:05 10:111:23:28:04
key image 01: 6dda386b4ae121f5cdc2e535476d43722744f928d37fe36fd3c6a6d89c8308d4 amount: 0.030000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4cae57954d192d94b3fb2dae4817844417c6f0538e79d1749e4e1e771b2951f4 00071116 1 144/16 2014-06-04 23:02:41 10:111:21:20:28
key image 02: f7f47628386d0890fcbeba9e1f18cba4f8f4565c56944d86027d84a5fb1c5e88 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a596bfdbfb8fee86527e4d40e25c72a29bdd137af9ccf364fb0400062ec935e5 00071066 0 0/5 2014-06-04 22:24:38 10:111:21:58:31
key image 03: e77694f8ead1843fe724abda75409cef08bb150ce32fb44eee1209e55d4fdb23 amount: 6.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7f5f691c1ede2165cfcf5808a2e95e1b11692d9fbea3d5b1d41fac403b73df35 00071066 0 0/5 2014-06-04 22:24:38 10:111:21:58:31
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 1865565624, "key_offsets": [ 0 ], "k_image": "54bd4a3ba94e9e4e97a4696f0df05e404f88817e0020b33ab43ee3cd1216e5a9" } }, { "key": { "amount": 30000000000, "key_offsets": [ 38552 ], "k_image": "6dda386b4ae121f5cdc2e535476d43722744f928d37fe36fd3c6a6d89c8308d4" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 72340 ], "k_image": "f7f47628386d0890fcbeba9e1f18cba4f8f4565c56944d86027d84a5fb1c5e88" } }, { "key": { "amount": 6000000000000, "key_offsets": [ 34742 ], "k_image": "e77694f8ead1843fe724abda75409cef08bb150ce32fb44eee1209e55d4fdb23" } } ], "vout": [ { "amount": 832478320, "target": { "key": "d14cdfa89758fc20227e3471df498fa696685264a67a8b2de06f234c322b0ae4" } }, { "amount": 2212642832, "target": { "key": "4a86011044c45b97e3566a906f6d474c6ae67b4069bd9bf13500f0eed1974b59" } }, { "amount": 5000000000, "target": { "key": "37efbc8a0ad492646e787136f05e25ad04a55e79cf0e3af8c540748df19396fa" } }, { "amount": 8000000000, "target": { "key": "0a51eeffe3d2b15e342fed9538e4ebe2cc626dcfe5141b1f8eef88fab44d3fe4" } }, { "amount": 50000000000, "target": { "key": "609777b277a67bbcece6d40954f94bfe706db533918860368c62ec2c546a340a" } }, { "amount": 60000000000, "target": { "key": "c4a588266f364e89fc1bb0ae62f88a7dc021f10ac446653a53c5971bb7827afc" } }, { "amount": 100000000000, "target": { "key": "d9c366d41287654af2da64312a49499e380795f6c795a458089306e5b924f01c" } }, { "amount": 800000000000, "target": { "key": "90072f85ff723a7907d2370962a39ac7ea544ff975c97cb6eae50f6f72f2d38a" } }, { "amount": 5000000000000, "target": { "key": "a1f7f3cd8cbfbb3bd25bc683b3c435c89ad1a63461addde4c64167f17a34cd9c" } }, { "amount": 10000000000000, "target": { "key": "0c3b19e34faee8fbe129b63df623f5083a6e56cd88b95838f2c41343eb4da342" } } ], "extra": [ 1, 238, 70, 162, 86, 237, 98, 41, 147, 216, 2, 62, 185, 139, 72, 98, 202, 81, 195, 250, 127, 172, 51, 147, 4, 77, 137, 57, 145, 113, 207, 16, 205 ], "signatures": [ "8d17ae8d4b6f4e475201566b2a2d28ba134944bfe449837c2df8f00f7d1bf5087bff298f4e3d3b12a9bddfe4d82212cba9524494053c7fe0d9fd987f1895a503", "17c20bf73db1b00a8aaba55966c5e3d82f71545ffc19f2e4031f239f5dac67036601ae36bd18fe79902f7d483aed72eaa3bc622eebafb738c8a29f7897655809", "522c9b8936e3627a4eedef808e3e2257b3d25c4c9f74ae25c02abb752780130971e45a75306c4401842cc5a79815156190911934219baf617bc19c4454718f0a", "589c85f08d273b6b69f3671f76bc4bb58f57920e53ffa1de5b3929b6e5fea402cf3b9f3c2f891c24c3b8bb917bff714065646dda32c7485792984e5784c22608"] }


Less details
source code | moneroexplorer