Monero Transaction 5094dea89bfa3110fb4fb3440583a15189b7f4cf3367e874c3483919858e47b0

Autorefresh is OFF

Tx hash: 5094dea89bfa3110fb4fb3440583a15189b7f4cf3367e874c3483919858e47b0

Tx prefix hash: 482dbbe12a6ea429cfd6202503f9b80764180a4ae94e208839b1b1436b19b5dc
Tx public key: 17904643320fd706937e705a3a0d56e8296b25c2e71e3e6d83f0da6a9391aa0d
Payment id: da210afd6ef51165981587c880edcea4a9247ad6351b773cbe72a524ec421885

Transaction 5094dea89bfa3110fb4fb3440583a15189b7f4cf3367e874c3483919858e47b0 was carried out on the Monero network on 2014-07-26 00:08:59. The transaction has 3133301 confirmations. Total output fee is 0.005197430000 XMR.

Timestamp: 1406333339 Timestamp [UTC]: 2014-07-26 00:08:59 Age [y:d:h:m:s]: 10:110:09:17:25
Block: 144936 Fee (per_kB): 0.005197430000 (0.005655864315) Tx size: 0.9189 kB
Tx version: 1 No of confirmations: 3133301 RingCT/type: no
Extra: 022100da210afd6ef51165981587c880edcea4a9247ad6351b773cbe72a524ec4218850117904643320fd706937e705a3a0d56e8296b25c2e71e3e6d83f0da6a9391aa0d

9 output(s) for total of 2.803802570000 xmr

stealth address amount amount idx tag
00: b31bd9fd94f905594526845c2beedf0a87299274cbdcf501128eeb978d13cb74 0.000802570000 0 of 2 -
01: 54e99d46a525c4bcf1ba05a8b31ab974807ab8955aca6f0fd3f42f28f12dc98d 0.006000000000 174153 of 256624 -
02: a9db750c34d7c1c5a4882179f5ec069d3b766cefca6205db4280ad2f1563f4db 0.007000000000 165248 of 247340 -
03: cb65298cb11d9de90052c0f445d5de322eb8aba8b82eb055bb44f30f0db61292 0.040000000000 124482 of 294095 -
04: 2887c7e80d83fdde31d291ccb73b0802cd7c89d2a03561eefb373dd6d6332972 0.050000000000 109198 of 284521 -
05: 893ae833592ab9b690b678e8b4f08588220970dc62e2b03c20ef1a39e1c03179 0.300000000000 121665 of 976536 -
06: 41a04054a378d8abea8209e8fc56ca650d725f3c46417c6b3053bb296ff73d92 0.400000000000 114006 of 688584 -
07: 0d6bf3957ac74db5b3ddd3ed993a3a9090ee781503935b11da92dc50021ac0c2 1.000000000000 135124 of 874629 -
08: f4264f1816c9daefefd97689c6fb8405aa9235e2d513ab12577c7dd698101697 1.000000000000 135125 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-29 03:06:44 till 2014-07-26 00:51:08; resolution: 0.34 days)

  • |______________________________________________*__________________________________________________________________________________________________________________________*|
  • |______________________________________________________*__________________________________________________________________________________________________________________*|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|

3 inputs(s) for total of 2.809000000000 xmr

key image 00: c46c8689d90251f30df86f05e20c3adf06abc71eb86c1137920f4ce776275fdb amount: 0.009000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7a78879053cc3d6ec1f09accaced8177141c44843ba44414649358cd0ec906dc 00083998 1 5/113 2014-06-13 21:13:46 10:152:12:12:38
- 01: ce0f560ff9e46e9d4f56fa6da71cc2a9306fbcd306c998ff6012bf69936c51f2 00144906 2 4/7 2014-07-25 23:29:50 10:110:09:56:34
key image 01: faf8a24a4709e2dbee0c76e77e94905f6b795f7dae88dc6be0dcd08c2e871ff8 amount: 0.800000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 03919f4823d8100e2dbac10c9ea40a970949e1740245071c0667a83b9cbab371 00087668 1 11/21 2014-06-16 09:01:39 10:150:00:24:45
- 01: 796cfb9af14d6fe71720e5744d63737b8b896a64cb6c916e4672c396a0d7b862 00144898 2 20/154 2014-07-25 23:22:56 10:110:10:03:28
key image 02: ad42a819e6b0aa05ee8707d125cee6590bfbcf778dffa6c17f4ff2819f614ce9 amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6d057195c5b4e94297e5f53a405c941e214ca5c4ab9c6cbe16ff71c22f40216d 00061359 1 4/101 2014-05-29 04:06:44 10:168:05:19:40
- 01: 8c140484aae9d8f222aaf237ba321678fa465dfc9267e49cc5841f94bc16cbd1 00144916 2 2/36 2014-07-25 23:51:08 10:110:09:35:16
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 9000000000, "key_offsets": [ 93615, 59121 ], "k_image": "c46c8689d90251f30df86f05e20c3adf06abc71eb86c1137920f4ce776275fdb" } }, { "key": { "amount": 800000000000, "key_offsets": [ 19346, 64132 ], "k_image": "faf8a24a4709e2dbee0c76e77e94905f6b795f7dae88dc6be0dcd08c2e871ff8" } }, { "key": { "amount": 2000000000000, "key_offsets": [ 2851, 51053 ], "k_image": "ad42a819e6b0aa05ee8707d125cee6590bfbcf778dffa6c17f4ff2819f614ce9" } } ], "vout": [ { "amount": 802570000, "target": { "key": "b31bd9fd94f905594526845c2beedf0a87299274cbdcf501128eeb978d13cb74" } }, { "amount": 6000000000, "target": { "key": "54e99d46a525c4bcf1ba05a8b31ab974807ab8955aca6f0fd3f42f28f12dc98d" } }, { "amount": 7000000000, "target": { "key": "a9db750c34d7c1c5a4882179f5ec069d3b766cefca6205db4280ad2f1563f4db" } }, { "amount": 40000000000, "target": { "key": "cb65298cb11d9de90052c0f445d5de322eb8aba8b82eb055bb44f30f0db61292" } }, { "amount": 50000000000, "target": { "key": "2887c7e80d83fdde31d291ccb73b0802cd7c89d2a03561eefb373dd6d6332972" } }, { "amount": 300000000000, "target": { "key": "893ae833592ab9b690b678e8b4f08588220970dc62e2b03c20ef1a39e1c03179" } }, { "amount": 400000000000, "target": { "key": "41a04054a378d8abea8209e8fc56ca650d725f3c46417c6b3053bb296ff73d92" } }, { "amount": 1000000000000, "target": { "key": "0d6bf3957ac74db5b3ddd3ed993a3a9090ee781503935b11da92dc50021ac0c2" } }, { "amount": 1000000000000, "target": { "key": "f4264f1816c9daefefd97689c6fb8405aa9235e2d513ab12577c7dd698101697" } } ], "extra": [ 2, 33, 0, 218, 33, 10, 253, 110, 245, 17, 101, 152, 21, 135, 200, 128, 237, 206, 164, 169, 36, 122, 214, 53, 27, 119, 60, 190, 114, 165, 36, 236, 66, 24, 133, 1, 23, 144, 70, 67, 50, 15, 215, 6, 147, 126, 112, 90, 58, 13, 86, 232, 41, 107, 37, 194, 231, 30, 62, 109, 131, 240, 218, 106, 147, 145, 170, 13 ], "signatures": [ "0fbf340d231d63e6f609cfde5d950720ec532052041c9e3da54e78a1a330f60fb23b5fa5001444bdbf1e80e5dff5daddb5d7bb50aec3dbde07f22b6c9762dd0172253e3a8fc5fa85592e7f122cb30ebec722607d30067709db3a9118cb66500478c6c88f807dd0bee155e08091f67af200600ae058775da74e03fe3ca5baec0b", "f493d6e0b5604aa3db105f86f1116e18b92cf612e2ed024844a8c82363b6d10fad293ee409553d18dc3f88332d55aa7a3a8110d0e24000d930e18ee45ec8860b8c6717db608e16c360971f010255f580ca7702d1c3923db5e42e9851f1d3fa098d6fa7dd1a1ca2d976eea90e496eff6735fff010431b9a3ad2cd1061375a5703", "daa9009686c55a5f95a1c063c97b5cc883c0f9fcab9e494ee9c2e86a667fd70569833097d5b4ff2bc257a402b8dab5f5569a7606cc71950338312cf880c9bc0057c1dbc7dd1735b17ae198fee5e770b971ca9c9f04c10df902ea478818186b0477562868b0dce61329153e49d9fd903575b537dff5c4b9b60fda6088c2ddc702"] }


Less details
source code | moneroexplorer