Monero Transaction 4c5052caf20fff399015a6a8370de81cc4e4b9f288ed10616d39e83e1c9dfd8e

Autorefresh is OFF

Tx hash: 4c5052caf20fff399015a6a8370de81cc4e4b9f288ed10616d39e83e1c9dfd8e

Tx prefix hash: 9562705863b08026494fb465a53766ca84d9edd9656e6548acf248409dd684ee
Tx public key: ed7c2877f17a2700a166a6b297591ecbc2e5ffb01cf1423f9bdc8bc2b1e595b2

Transaction 4c5052caf20fff399015a6a8370de81cc4e4b9f288ed10616d39e83e1c9dfd8e was carried out on the Monero network on 2016-12-15 19:57:21. The transaction has 2110136 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1481831841 Timestamp [UTC]: 2016-12-15 19:57:21 Age [y:d:h:m:s]: 08:013:20:49:11
Block: 1202113 Fee (per_kB): 0.010000000000 (0.023813953488) Tx size: 0.4199 kB
Tx version: 1 No of confirmations: 2110136 RingCT/type: no
Extra: 01ed7c2877f17a2700a166a6b297591ecbc2e5ffb01cf1423f9bdc8bc2b1e595b2de20b76fd96ee7e792668d5befa0884381b81d925cd6817db3d70a97f4f4c30382ca

3 output(s) for total of 0.390000000000 xmr

stealth address amount amount idx tag
00: cd3791c0164c7f8323d0e1a74fb87588883e1ff96b44eaebbb9a06843fbb25eb 0.090000000000 293551 of 317822 -
01: c685da6d3e40406008138f5904bb06256ca839b59fe21856f3ac0ef516e266d5 0.100000000000 956481 of 982315 -
02: fa51a82596cc2d6c656693faededb45fc1897458ccb993456faba7789b64b264 0.200000000000 1230519 of 1272211 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-22 08:44:36 till 2016-12-15 16:23:43; resolution: 5.34 days)

  • |_*____________*__________________________________________________________________________________________________________________________________________________________*|

1 inputs(s) for total of 0.400000000000 xmr

key image 00: 653657868283ee4eed714d0f91c6d475764013d54ccaac3b475bae0529b76730 amount: 0.400000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3bf060f3ec08ec4c5ec03e194a8583c4dc94296c4ba80f6f54cc4e248f9cd793 00096479 1 17/179 2014-06-22 09:44:36 10:191:07:01:56
- 01: bedba2ece8778acdb2847d09b7ebd77cb87d5b42a4d11564c7e7c7e24a47f8db 00200414 3 54/207 2014-09-02 14:16:15 10:119:02:30:17
- 02: cf4a2ff0d880d4ea1aca06c8eefcb059c309111b5531ce6f06301501ade9b464 01201966 3 1/6 2016-12-15 15:23:43 08:014:01:22:49
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 400000000000, "key_offsets": [ 42795, 140175, 483649 ], "k_image": "653657868283ee4eed714d0f91c6d475764013d54ccaac3b475bae0529b76730" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "cd3791c0164c7f8323d0e1a74fb87588883e1ff96b44eaebbb9a06843fbb25eb" } }, { "amount": 100000000000, "target": { "key": "c685da6d3e40406008138f5904bb06256ca839b59fe21856f3ac0ef516e266d5" } }, { "amount": 200000000000, "target": { "key": "fa51a82596cc2d6c656693faededb45fc1897458ccb993456faba7789b64b264" } } ], "extra": [ 1, 237, 124, 40, 119, 241, 122, 39, 0, 161, 102, 166, 178, 151, 89, 30, 203, 194, 229, 255, 176, 28, 241, 66, 63, 155, 220, 139, 194, 177, 229, 149, 178, 222, 32, 183, 111, 217, 110, 231, 231, 146, 102, 141, 91, 239, 160, 136, 67, 129, 184, 29, 146, 92, 214, 129, 125, 179, 215, 10, 151, 244, 244, 195, 3, 130, 202 ], "signatures": [ "3dbcd132be5bea2d304c82045070484efb3c545067fe486ceb0ebd3e6bcf6702bed621970c144212ced1a68cef20f5c2bb97ddc0d90494320a3abe6f01dca0090d085fbde8d79967211748d6c36cc7581518d068cc28b6fd580a9f0e92f5cf083f2b2de33cf3c1cdebe50cc752432173f2d709f8ecade99bca823199a4c490022200482f945cfb6e2b2f98f9027afb1f07c0decac074c332b02915524f4e8d0df6bec8754c01e45b68463355417117e86bbaf5a2cfaf9a5ab57dcb8df221a30d"] }


Less details
source code | moneroexplorer