Monero Transaction 50772a5622f1c615d9f26dac3721bde46e3efe73bae4f8a6b4b688fcb9aa7ca0

Autorefresh is OFF

Tx hash: 50772a5622f1c615d9f26dac3721bde46e3efe73bae4f8a6b4b688fcb9aa7ca0

Tx prefix hash: c97526ec7af46767297b0a03897a10526dba0041f2c6ae5ba2599f956ff18598
Tx public key: d6a7f21a5709f950b5a54d3c5cb412e031d42c7efc9be5d1ee3c3bdf9fe47dc5

Transaction 50772a5622f1c615d9f26dac3721bde46e3efe73bae4f8a6b4b688fcb9aa7ca0 was carried out on the Monero network on 2014-06-29 08:05:19. The transaction has 3171754 confirmations. Total output fee is 0.017565850000 XMR.

Timestamp: 1404029119 Timestamp [UTC]: 2014-06-29 08:05:19 Age [y:d:h:m:s]: 10:137:01:31:04
Block: 106486 Fee (per_kB): 0.017565850000 (0.020324780113) Tx size: 0.8643 kB
Tx version: 1 No of confirmations: 3171754 RingCT/type: no
Extra: 01d6a7f21a5709f950b5a54d3c5cb412e031d42c7efc9be5d1ee3c3bdf9fe47dc5

8 output(s) for total of 33.077434150000 xmr

stealth address amount amount idx tag
00: e0691dd1286eed7aa3045fa5c35e4e9d3549fe48e582d36f94a24309df95ff94 0.007434150000 0 of 1 -
01: a7e3e26f88896e648df8e2b2922b7a00bd216075ef003bb2e30a92fb8f1bea83 0.010000000000 308428 of 502466 -
02: bdd6640ced3cb984813a4108c5930b538bcb86abb9e8d846757d95c69ca9f5cf 0.060000000000 87404 of 264760 -
03: e0d14c4b51b670187cf0d7b154c49537f59a705c87364db8671a994fa1db5fad 0.400000000000 53030 of 688584 -
04: ca032cfb93066d704eb476fad93c2565f6137691c987bfe13abd85a278ed8e6a 0.600000000000 43108 of 650760 -
05: 2ce6eed0c7b36c3a092210d1dc6148daf94dc64a26b089d22dcab8c09f074a62 3.000000000000 17906 of 300495 -
06: f00aef45f8e211e4806d5127df20a323386791b5064ad5a85a5eb963a5189872 9.000000000000 8409 of 274259 -
07: eeb808a18688600e3383a5347b79970fbc5f4d0d49c0c48c86e084b583107e27 20.000000000000 3938 of 78991 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-23 21:57:42 till 2014-06-28 18:06:39; resolution: 0.03 days)

  • |________________________________________________________________________________________________________________________________________________________________________*_|
  • |__*_______________________________________________________________________________________________________________________________________________________________________|
  • |________________________________________________________________________________________________________________________________________________________*_________________|
  • |__________________________________________________________________________*_______________________________________________________________________________________________|
  • |______________________________________________________________________________________________________________________________________________________________________*___|

5 inputs(s) for total of 33.095000000000 xmr

key image 00: 5753cf7886486bee0ae201212caa02612a5532aa3ffe2a7ab309f372a8759400 amount: 0.005000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c7d47321781bcf6dc93b8a9de99538470c258acb2e859704f7c4c86757769c47 00105574 1 22/3 2014-06-28 17:06:39 10:137:16:29:44
key image 01: b0c1577736912c3407949ce52fd9478ac9690cccbb64f5922f381d18ffd5fd78 amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0abf1c12c88941bd880924c9b86ca80d13a7f8b69a4a5242550c662fc1a35d22 00098727 1 9/6 2014-06-23 22:57:42 10:142:10:38:41
key image 02: 516e80883cf1df714ba8190d613ea93b0ae956bf6431f10676501d2a1684c950 amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c56b196d49ae4ed774af08781cf40b08db8bb3080fc64eb01afc3088f08fe67c 00104877 1 11/3 2014-06-28 05:55:32 10:138:03:40:51
key image 03: 097815458f7fe9a85256baa1ac0ed98310820cb6d1a3b7cecf0a344f55e20a70 amount: 20.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a50dd55a6999abbb7bd4e638d96190d84e8c76147127e9ae9aecaefa220a6689 00101653 1 31/4 2014-06-26 00:32:59 10:140:09:03:24
key image 04: b3e38623cd11e4f3fcf74f00a24e825b0f171f1b17532ae15a9950b12ed4642d amount: 8.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d35c0beaefb09a392605a800fb47893e6858ded06b766f49480954d395b78c57 00105485 1 3/8 2014-06-28 15:49:54 10:137:17:46:29
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000, "key_offsets": [ 179283 ], "k_image": "5753cf7886486bee0ae201212caa02612a5532aa3ffe2a7ab309f372a8759400" } }, { "key": { "amount": 90000000000, "key_offsets": [ 66017 ], "k_image": "b0c1577736912c3407949ce52fd9478ac9690cccbb64f5922f381d18ffd5fd78" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 23085 ], "k_image": "516e80883cf1df714ba8190d613ea93b0ae956bf6431f10676501d2a1684c950" } }, { "key": { "amount": 20000000000000, "key_offsets": [ 3478 ], "k_image": "097815458f7fe9a85256baa1ac0ed98310820cb6d1a3b7cecf0a344f55e20a70" } }, { "key": { "amount": 8000000000000, "key_offsets": [ 6679 ], "k_image": "b3e38623cd11e4f3fcf74f00a24e825b0f171f1b17532ae15a9950b12ed4642d" } } ], "vout": [ { "amount": 7434150000, "target": { "key": "e0691dd1286eed7aa3045fa5c35e4e9d3549fe48e582d36f94a24309df95ff94" } }, { "amount": 10000000000, "target": { "key": "a7e3e26f88896e648df8e2b2922b7a00bd216075ef003bb2e30a92fb8f1bea83" } }, { "amount": 60000000000, "target": { "key": "bdd6640ced3cb984813a4108c5930b538bcb86abb9e8d846757d95c69ca9f5cf" } }, { "amount": 400000000000, "target": { "key": "e0d14c4b51b670187cf0d7b154c49537f59a705c87364db8671a994fa1db5fad" } }, { "amount": 600000000000, "target": { "key": "ca032cfb93066d704eb476fad93c2565f6137691c987bfe13abd85a278ed8e6a" } }, { "amount": 3000000000000, "target": { "key": "2ce6eed0c7b36c3a092210d1dc6148daf94dc64a26b089d22dcab8c09f074a62" } }, { "amount": 9000000000000, "target": { "key": "f00aef45f8e211e4806d5127df20a323386791b5064ad5a85a5eb963a5189872" } }, { "amount": 20000000000000, "target": { "key": "eeb808a18688600e3383a5347b79970fbc5f4d0d49c0c48c86e084b583107e27" } } ], "extra": [ 1, 214, 167, 242, 26, 87, 9, 249, 80, 181, 165, 77, 60, 92, 180, 18, 224, 49, 212, 44, 126, 252, 155, 229, 209, 238, 60, 59, 223, 159, 228, 125, 197 ], "signatures": [ "fed1ccfe723080e4c322722411f61dcbd23b93b39103893240b82fc9c8ffbe09a9d7c51f5a6a516429218592efea183cdadba04e8eb667bff9ba2610f118ab0e", "dc5aaec9eb69b87c13c5675c30feaab54c9e0d98de431b10dd8dbba3f550c0078e674b670e27051224093ff3c8a465679d066f92aa97692604be709aaa6a230e", "1378ef97da4c1a397198b3f6c262d32ca287cd52162fb4f73d6ebaf3a5dc8f0d947f8c85d4006718bc5df016901b13bf564d88a04158aa2079b16807ad985807", "04bfe5aa30c456f85d658089714b4c507785fc2865fbed4e628519b457f9bf07eaa3243c13c4425fb6288d160e58622af90810c5d1005c2afe44e16443fe6e00", "5d4752141219e5d1553acb531e089e6752ded784b9e8d612e16ea64f833aaf0de58bbd0215dd256cfe82c878b2e336136d8da07d831d2a6d1268927c46ab4d04"] }


Less details
source code | moneroexplorer