Monero Transaction 50273db713a302915c2025dc834ecd23189d5b2e10569503f32047e8c606d196

Autorefresh is OFF

Tx hash: 50273db713a302915c2025dc834ecd23189d5b2e10569503f32047e8c606d196

Tx prefix hash: c2bad808297f647864bacdaff918f873c20139d33d8420cd23d1d156069f1519
Tx public key: 2e92c0a9c8927d806544992c5b0dc2aaaaf32357f921ea136ab97a1d6bb9d3fa
Payment id: da89cfc4f039fa0f509bdae2ed3fb6c31faf1d9175153203bfb246ab59c789c5

Transaction 50273db713a302915c2025dc834ecd23189d5b2e10569503f32047e8c606d196 was carried out on the Monero network on 2014-07-19 19:40:14. The transaction has 3144147 confirmations. Total output fee is 0.005569980000 XMR.

Timestamp: 1405798814 Timestamp [UTC]: 2014-07-19 19:40:14 Age [y:d:h:m:s]: 10:119:08:02:01
Block: 136029 Fee (per_kB): 0.005569980000 (0.007446030705) Tx size: 0.7480 kB
Tx version: 1 No of confirmations: 3144147 RingCT/type: no
Extra: 022100da89cfc4f039fa0f509bdae2ed3fb6c31faf1d9175153203bfb246ab59c789c5012e92c0a9c8927d806544992c5b0dc2aaaaf32357f921ea136ab97a1d6bb9d3fa

9 output(s) for total of 4.014430020000 xmr

stealth address amount amount idx tag
00: 9a166bb8295f3c74804d4e316f805af6de7c9c4e987e221fbd6de7ffd3606c01 0.000430020000 0 of 3 -
01: 153622be16c74949cca826da6fc2d9720c0d78b0bd1fb93c2a546c1c283440aa 0.005000000000 191119 of 308585 -
02: cd1a7c4b09841c99751ecebc8f01db1d30ae2c014bf63933069fc244e65acab9 0.009000000000 150562 of 233398 -
03: c7eadbdb03ddbb79d48a771fdab70ff01d2e7c066a20dd67e6f1ea4e44315d3d 0.050000000000 106611 of 284521 -
04: addf356d0bfdd2cd8eb6ef5188993c5a35e3bffa1275733196300c62efd6dda1 0.050000000000 106612 of 284521 -
05: 766ec6342e2c254e04354117b33188b0cf9f4a971d9b31d6ad7de43b29955972 0.100000000000 296333 of 982315 -
06: e3a2dd535418a938e32f7d0e6adab4114dac99d289517409309a2fb35c3ccf09 0.800000000000 73288 of 489955 -
07: 1591960bc2d9386fee925c6cb7cccad7b89ea0e28a7a4820fe773691fe4052b5 1.000000000000 116607 of 874629 -
08: 5f04562d643888141308c0c16239e98db2fc6c609e7e36c94fe6eeab679822f4 2.000000000000 47012 of 434057 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-06 19:46:01 till 2014-07-19 18:07:15; resolution: 0.25 days)

  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |______________________________________*__________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 4.020000000000 xmr

key image 00: 01d0d4f9980db3bd733fb761d7b920c3fd6f0e8cf559abdfb237149f9b069c50 amount: 0.020000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 461d4814da4f77add9acf94df85d30652528de8e0701d802245c86e794fe0035 00073810 0 0/7 2014-06-06 20:46:01 10:162:06:56:14
- 01: c59e3e47cdf4005bbd77dbeabab2e8d3e440b684ac4149907652108bfaa0e9ab 00135864 2 5/6 2014-07-19 17:00:29 10:119:10:41:46
key image 01: cda8ec543cedf7f634af805d6546d0ad5a4541fa9ff9b8770722a4c281f1980a amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3d49159b46fabc256cb8d5eb850888cc1be83ce533875a554d1427d379f3ba9b 00087427 1 18/335 2014-06-16 06:12:36 10:152:21:29:39
- 01: 03eaa9aa2cfac41c61a9b339871c79fa5fb1d3e630d7e83231185258cac52fd9 00135870 2 1/8 2014-07-19 17:07:15 10:119:10:35:00
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 20000000000, "key_offsets": [ 64688, 136157 ], "k_image": "01d0d4f9980db3bd733fb761d7b920c3fd6f0e8cf559abdfb237149f9b069c50" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 9034, 16013 ], "k_image": "cda8ec543cedf7f634af805d6546d0ad5a4541fa9ff9b8770722a4c281f1980a" } } ], "vout": [ { "amount": 430020000, "target": { "key": "9a166bb8295f3c74804d4e316f805af6de7c9c4e987e221fbd6de7ffd3606c01" } }, { "amount": 5000000000, "target": { "key": "153622be16c74949cca826da6fc2d9720c0d78b0bd1fb93c2a546c1c283440aa" } }, { "amount": 9000000000, "target": { "key": "cd1a7c4b09841c99751ecebc8f01db1d30ae2c014bf63933069fc244e65acab9" } }, { "amount": 50000000000, "target": { "key": "c7eadbdb03ddbb79d48a771fdab70ff01d2e7c066a20dd67e6f1ea4e44315d3d" } }, { "amount": 50000000000, "target": { "key": "addf356d0bfdd2cd8eb6ef5188993c5a35e3bffa1275733196300c62efd6dda1" } }, { "amount": 100000000000, "target": { "key": "766ec6342e2c254e04354117b33188b0cf9f4a971d9b31d6ad7de43b29955972" } }, { "amount": 800000000000, "target": { "key": "e3a2dd535418a938e32f7d0e6adab4114dac99d289517409309a2fb35c3ccf09" } }, { "amount": 1000000000000, "target": { "key": "1591960bc2d9386fee925c6cb7cccad7b89ea0e28a7a4820fe773691fe4052b5" } }, { "amount": 2000000000000, "target": { "key": "5f04562d643888141308c0c16239e98db2fc6c609e7e36c94fe6eeab679822f4" } } ], "extra": [ 2, 33, 0, 218, 137, 207, 196, 240, 57, 250, 15, 80, 155, 218, 226, 237, 63, 182, 195, 31, 175, 29, 145, 117, 21, 50, 3, 191, 178, 70, 171, 89, 199, 137, 197, 1, 46, 146, 192, 169, 200, 146, 125, 128, 101, 68, 153, 44, 91, 13, 194, 170, 170, 243, 35, 87, 249, 33, 234, 19, 106, 185, 122, 29, 107, 185, 211, 250 ], "signatures": [ "cd47026f775d24a3a81fa2d65ee144a1887b3df093e2d8cbeca1d4f63a6b720132c8fcbed7eea58f9c7c8ac7070efac6b49d1c9e3edb571da16e84ef3d6dcb0619962bd206021276d54b14e72f7d39e1db8d0958d67b4cc895f84fc89499d90ee2eaa1bd87199394a700431c577d4c3863001e6c35f785117ca8a52d8ba9470e", "7dc3afc83018ed5b75694cff0e2300cf30a13b3242a49549fb0c32b8f463f70b67b42b6262d204617f35a122f7dbcb038802a5d15d2dd3c5579d564947f0070835ca3ff6d46736d1ead2fd9187fb7bd7a53a825c7f101716b69034913cf9930bf13928490b2d3a93c42b0c0c9fe9204843b13bcb7bf13c7aa1a98e6ad18a1c07"] }


Less details
source code | moneroexplorer