Monero Transaction 508e1b95c53025af364762946c3c9e4533d2b395eba73cf6d5762a030db54c5e

Autorefresh is OFF

Tx hash: 508e1b95c53025af364762946c3c9e4533d2b395eba73cf6d5762a030db54c5e

Tx prefix hash: ab0af4e00675ac4dc1546cfbb7052e33c0565b5d6a331581e977a1f6f6d3a1e3
Tx public key: 29b164c09c558b9b97eef344ba7aba8475cbc5e6bdd5c22e1fa297dad8cc1c8d

Transaction 508e1b95c53025af364762946c3c9e4533d2b395eba73cf6d5762a030db54c5e was carried out on the Monero network on 2014-06-19 13:42:56. The transaction has 3185902 confirmations. Total output fee is 0.008227428358 XMR.

Timestamp: 1403185376 Timestamp [UTC]: 2014-06-19 13:42:56 Age [y:d:h:m:s]: 10:146:17:55:19
Block: 92276 Fee (per_kB): 0.008227428358 (0.008518591141) Tx size: 0.9658 kB
Tx version: 1 No of confirmations: 3185902 RingCT/type: no
Extra: 0129b164c09c558b9b97eef344ba7aba8475cbc5e6bdd5c22e1fa297dad8cc1c8d

8 output(s) for total of 16.032045600730 xmr

stealth address amount amount idx tag
00: b9c186870f51ae50e1188a9d4d509098ef2876dcc414be876b3fc324f49c6859 0.000857393322 0 of 1 -
01: 31b724ad102960d5cc2d9639cf810a5749a2928f6db4294f1e60e78fe2c45ac1 0.004188207408 0 of 1 -
02: de4661566a3dd0829e74077f457c51db54150a0089d9eb4f697c9237387e1b6d 0.007000000000 140323 of 247340 -
03: 3f5ed256c04e0728bdfa9a87e3908c3a507bcee7f90cde95b487a48bbe7bb68c 0.060000000000 75814 of 264760 -
04: 4640616a77dca3e8fd31314fb16ec7d46224aa92711a09407e1e7260755ab5d6 0.060000000000 75815 of 264760 -
05: 5ca0550307cfcbe192158d7b037bb5451e6687d12258a8c6a3a32f1d37c6d3fa 0.900000000000 22434 of 454894 -
06: 6d9927e3c0dea8834ce43901f154a1ec1c2bd5ceb3b107448e19a8257ad3c5d7 5.000000000000 15285 of 255089 -
07: 79ae5ff4793a601a75c1c1fe487041e48f71d86593ca716de96d41a273e85d2d 10.000000000000 98723 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-17 20:06:43 till 2014-06-19 13:44:05; resolution: 0.01 days)

  • |_____*____________________________________________________________________________________________________________________________________________________________________|
  • |________________________________________________________________________________________________________________________________________________________________*_________|
  • |_____________________________________________________________________________________________________________________________________________________________________*____|
  • |_____________________________________________________________________________________________________________________________________________________________________*____|
  • |____________________________________________________________________________________________________________________________________________________________________*_____|
  • |____________________________________________________________________________________________________________________________________________________________________*_____|

6 inputs(s) for total of 16.040273029088 xmr

key image 00: 0bba4ff07a223120ff0a61030d2920d869f32330c547abdd827d4078a1b1d6f5 amount: 0.000273029088
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 04eb5d13af4d6cba143f09f7b90a4f772ec4fadaaed7325537c789aadcda0f39 00089749 0 0/6 2014-06-17 21:06:43 10:148:10:31:32
key image 01: 58421b96f6ca3a063b1fca23400146fc0f585ada3f52b93aa3c48f2d9d8bf411 amount: 0.040000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f755d9ec58e70dfd0afa22f599448dddb4863589a2aedc24127543bf082d4bba 00092137 0 0/6 2014-06-19 11:30:28 10:146:20:07:47
key image 02: 578169dd41a984f5de6b8b8ce72b0d2c55f06122cd32f7b2413c8e8254fb211b amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 09ca0501d82b5bf227ff1a891e39523a8128e6401031ae2fdf36cf82bc394346 00092215 0 0/5 2014-06-19 12:44:05 10:146:18:54:10
key image 03: 5b24b2595edf6fe1ffc670b066f5dac876673080bfc54f4c6853b6444559cbc8 amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 61444effe2d36d11538af6f35ae3aebb97492c63d401ef085d8eb2740c2bfc17 00092206 1 18/13 2014-06-19 12:37:03 10:146:19:01:12
key image 04: f81b39e856674fb15f2bf5c77f3ec7036ecd5b345cc743dd8e05410ff46f71ec amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 510330a443e3dbe4a1edb262d6657eed4f436eba4ae7e52dde6eded5b1670c78 00092194 0 0/5 2014-06-19 12:21:06 10:146:19:17:09
key image 05: dbc7d35e283d7db48fb48a8ab4857341c90c0545458db65fd582d4967da6b30a amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5d03ddb5ed2be8ec9c9ad4c6cf7c76411bc62e13eecf2f59c4ce541dbd0b6cb8 00092194 0 0/5 2014-06-19 12:21:06 10:146:19:17:09
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 273029088, "key_offsets": [ 0 ], "k_image": "0bba4ff07a223120ff0a61030d2920d869f32330c547abdd827d4078a1b1d6f5" } }, { "key": { "amount": 40000000000, "key_offsets": [ 100707 ], "k_image": "58421b96f6ca3a063b1fca23400146fc0f585ada3f52b93aa3c48f2d9d8bf411" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 15226 ], "k_image": "578169dd41a984f5de6b8b8ce72b0d2c55f06122cd32f7b2413c8e8254fb211b" } }, { "key": { "amount": 900000000000, "key_offsets": [ 22362 ], "k_image": "5b24b2595edf6fe1ffc670b066f5dac876673080bfc54f4c6853b6444559cbc8" } }, { "key": { "amount": 100000000000, "key_offsets": [ 125908 ], "k_image": "f81b39e856674fb15f2bf5c77f3ec7036ecd5b345cc743dd8e05410ff46f71ec" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 98612 ], "k_image": "dbc7d35e283d7db48fb48a8ab4857341c90c0545458db65fd582d4967da6b30a" } } ], "vout": [ { "amount": 857393322, "target": { "key": "b9c186870f51ae50e1188a9d4d509098ef2876dcc414be876b3fc324f49c6859" } }, { "amount": 4188207408, "target": { "key": "31b724ad102960d5cc2d9639cf810a5749a2928f6db4294f1e60e78fe2c45ac1" } }, { "amount": 7000000000, "target": { "key": "de4661566a3dd0829e74077f457c51db54150a0089d9eb4f697c9237387e1b6d" } }, { "amount": 60000000000, "target": { "key": "3f5ed256c04e0728bdfa9a87e3908c3a507bcee7f90cde95b487a48bbe7bb68c" } }, { "amount": 60000000000, "target": { "key": "4640616a77dca3e8fd31314fb16ec7d46224aa92711a09407e1e7260755ab5d6" } }, { "amount": 900000000000, "target": { "key": "5ca0550307cfcbe192158d7b037bb5451e6687d12258a8c6a3a32f1d37c6d3fa" } }, { "amount": 5000000000000, "target": { "key": "6d9927e3c0dea8834ce43901f154a1ec1c2bd5ceb3b107448e19a8257ad3c5d7" } }, { "amount": 10000000000000, "target": { "key": "79ae5ff4793a601a75c1c1fe487041e48f71d86593ca716de96d41a273e85d2d" } } ], "extra": [ 1, 41, 177, 100, 192, 156, 85, 139, 155, 151, 238, 243, 68, 186, 122, 186, 132, 117, 203, 197, 230, 189, 213, 194, 46, 31, 162, 151, 218, 216, 204, 28, 141 ], "signatures": [ "adfdef7b82205a332c25cd1d5c3fb84be967e3701103ff30b08b234021a39c091f1f13fe3cd1dd577dae0a45d2503f4b6ecea822885184ff3a5a22aad5e56f0a", "087fc7502d05e35294e5d983a87e0a73a9eed836a5c13f3901199cee403d680b9e4ae5a94b62d38dba99404223ccdd87c13091e32c67e5333d3d70ac5ccd7900", "de5dcce7efae6b7b6a287c07aa59acc40a69c227f13330e07d6e94829173c800f16bb613f595a2791f06d10a9ef0741fff0d137fd70902f91a29b94033a3dc01", "0026e0fcb3e8dd82b4e487534292dfc9bbff1157576da4f16be38890c62a28068dc51949938c0a57c2f0cceee6bc3041a0f81f29fd0adc5dae0a42486deec600", "37c68692bbad9d5e83ec7a3be5cb01b02034ae6a71625ac6f38ea3335667c0034a23e6a5022c0ee7a73536c27e456edb8cf41b13a6542eda754d9d3d7691fe0b", "c56fafe5f29ea66983aeba0d6c14755825fd10925e75b74d063ab4c5c578f40796f4d959af3c1878270a3d3bdafed4691a220a0c2b870dbe9f80fdc65410c902"] }


Less details
source code | moneroexplorer