Monero Transaction 504a42d4ab1d81b32edeec5f039977edc5c5a04f13554cd5a7c74f5e7e583046

Autorefresh is OFF

Tx hash: 504a42d4ab1d81b32edeec5f039977edc5c5a04f13554cd5a7c74f5e7e583046

Tx prefix hash: bb81d67cc0ee33907bf66dc51c7f49f68143b57e02801a700c1ecbd554d463ac
Tx public key: 2487bbfdd21ed96a698ab26a3227385f86f6013afe933e93a25bc03e22d566ce
Payment id: 3b8ce93ad5704e6aaa8b0f212c8c60ad5001cbee399e49d79fae877892199963

Transaction 504a42d4ab1d81b32edeec5f039977edc5c5a04f13554cd5a7c74f5e7e583046 was carried out on the Monero network on 2015-03-17 18:47:57. The transaction has 2815191 confirmations. Total output fee is 0.014323750000 XMR.

Timestamp: 1426618077 Timestamp [UTC]: 2015-03-17 18:47:57 Age [y:d:h:m:s]: 09:265:04:03:25
Block: 480721 Fee (per_kB): 0.014323750000 (0.020775524079) Tx size: 0.6895 kB
Tx version: 1 No of confirmations: 2815191 RingCT/type: no
Extra: 0221003b8ce93ad5704e6aaa8b0f212c8c60ad5001cbee399e49d79fae877892199963012487bbfdd21ed96a698ab26a3227385f86f6013afe933e93a25bc03e22d566ce

8 output(s) for total of 30.892676250000 xmr

stealth address amount amount idx tag
00: 0ef1b6d145fa879a08b1e1fc1b10c6c1eed31ea3ec56daf885edcdec95650a25 0.002676250000 0 of 2 -
01: 125061472f2d8fceb23016df809969a7117e94e0a9552cecc65504d83263d79e 0.040000000000 159075 of 294095 -
02: 4a4922945f9911cf1a45ba990756fdec41a6784561346541859a8fc1e62526f4 0.050000000000 144734 of 284521 -
03: 7d6eb2ad348cb2b123bea842f4703a75b8997195efdd0dc49fb9140012084d22 0.900000000000 216452 of 454894 -
04: 2094c16907fd595341959e5cbae9b2a86904152bc7390ed146e75dc3b241a020 0.900000000000 216453 of 454894 -
05: b5988f99aba656751e606ecafffc0d26885e7d4dbc9c569144d08c9384fbc2eb 1.000000000000 500412 of 874629 -
06: e1caee8b0eb95b0f89dc7e26764cf76844f9dd8dd69e72daf5d2d2a497bf7ecb 8.000000000000 34382 of 226902 -
07: dd2a1c7139f453ada432442c0ff610be3790d4830abaf9c6557e2470b3704f1d 20.000000000000 29489 of 78991 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-12-17 12:24:49 till 2015-02-02 14:23:40; resolution: 0.28 days)

  • |_______________________________________________________________________________________*__________________________________________________________________________________|
  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|

3 inputs(s) for total of 30.907000000000 xmr

key image 00: 346019475962c9ab1a19f6fb806d7faffe31cf5d1d37652300c40a64e641f76b amount: 0.007000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a759d258b2a67f9b72c526c36e61943c211c71381a5a5592f066fcd5039bd5bc 00385777 1 2/8 2015-01-10 12:12:52 09:331:10:38:30
key image 01: 4f2217aa08051f4bdc3ddd9b9f9f0279e2bfbf2f7c2996d61bd5fd1f2ab5ed57 amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 74867d7a7dfbc5f482d3a3948c0ab580eb7786f1c25aa2e4ff2f1985ecdc7e0c 00351769 1 3/6 2014-12-17 13:24:49 09:355:09:26:33
key image 02: 5f90549b60b5e85236bf8a70f4e1749405bc383e0ef5183773a61b92530e17d8 amount: 30.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 49945a26fc8be9b720f359d449ab470d48b2f1164d5b933dacbda7d72b09fc17 00418780 1 117/3 2015-02-02 13:23:40 09:308:09:27:42
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 7000000000, "key_offsets": [ 185560 ], "k_image": "346019475962c9ab1a19f6fb806d7faffe31cf5d1d37652300c40a64e641f76b" } }, { "key": { "amount": 900000000000, "key_offsets": [ 181315 ], "k_image": "4f2217aa08051f4bdc3ddd9b9f9f0279e2bfbf2f7c2996d61bd5fd1f2ab5ed57" } }, { "key": { "amount": 30000000000000, "key_offsets": [ 14612 ], "k_image": "5f90549b60b5e85236bf8a70f4e1749405bc383e0ef5183773a61b92530e17d8" } } ], "vout": [ { "amount": 2676250000, "target": { "key": "0ef1b6d145fa879a08b1e1fc1b10c6c1eed31ea3ec56daf885edcdec95650a25" } }, { "amount": 40000000000, "target": { "key": "125061472f2d8fceb23016df809969a7117e94e0a9552cecc65504d83263d79e" } }, { "amount": 50000000000, "target": { "key": "4a4922945f9911cf1a45ba990756fdec41a6784561346541859a8fc1e62526f4" } }, { "amount": 900000000000, "target": { "key": "7d6eb2ad348cb2b123bea842f4703a75b8997195efdd0dc49fb9140012084d22" } }, { "amount": 900000000000, "target": { "key": "2094c16907fd595341959e5cbae9b2a86904152bc7390ed146e75dc3b241a020" } }, { "amount": 1000000000000, "target": { "key": "b5988f99aba656751e606ecafffc0d26885e7d4dbc9c569144d08c9384fbc2eb" } }, { "amount": 8000000000000, "target": { "key": "e1caee8b0eb95b0f89dc7e26764cf76844f9dd8dd69e72daf5d2d2a497bf7ecb" } }, { "amount": 20000000000000, "target": { "key": "dd2a1c7139f453ada432442c0ff610be3790d4830abaf9c6557e2470b3704f1d" } } ], "extra": [ 2, 33, 0, 59, 140, 233, 58, 213, 112, 78, 106, 170, 139, 15, 33, 44, 140, 96, 173, 80, 1, 203, 238, 57, 158, 73, 215, 159, 174, 135, 120, 146, 25, 153, 99, 1, 36, 135, 187, 253, 210, 30, 217, 106, 105, 138, 178, 106, 50, 39, 56, 95, 134, 246, 1, 58, 254, 147, 62, 147, 162, 91, 192, 62, 34, 213, 102, 206 ], "signatures": [ "83c933305991e84569d6e164344bef3be8a6c226e0e6238188b0d304c215c6067fb969c61d16a1aa716f16675a4e0a52451d26ad0763dfea0c0d554d581ff903", "a8154c94d08ab057e450cdbf08cfd306c2b57595242a38440d1db874cd9b0f09bd2921c2f7ee19182382dd93e2cc3f09fe2cc723ec423149c8026c956b00d102", "dd2e1e0cebde79a6db5d9d23c5bfd2b02c73b24ef906ca42aebf4d675fa40d018e2aefd80c798082b6ff759897b157d8d19ecb01aa34a9815bc5647f277e760a"] }


Less details
source code | moneroexplorer