Monero Transaction 50bdca08f681c3a145e70f26b9660675cc145d7f5347996115f5ecdfb68252ee

Autorefresh is OFF

Tx hash: 50bdca08f681c3a145e70f26b9660675cc145d7f5347996115f5ecdfb68252ee

Tx prefix hash: ea879255c59ae3bf94a2ec78149680e1cacd1ffc6ecc011782c836c3e14bc44b
Tx public key: da0a828a327d601aaec8e493cebf402172957c923aaafee165791da209b986b5
Payment id: 45b68ac67af7193b7ada814a6ba528e28977aef1567e578f484e595f0962c421

Transaction 50bdca08f681c3a145e70f26b9660675cc145d7f5347996115f5ecdfb68252ee was carried out on the Monero network on 2014-08-09 18:16:51. The transaction has 3121831 confirmations. Total output fee is 0.007991955314 XMR.

Timestamp: 1407608211 Timestamp [UTC]: 2014-08-09 18:16:51 Age [y:d:h:m:s]: 10:109:04:48:33
Block: 166158 Fee (per_kB): 0.007991955314 (0.012269508608) Tx size: 0.6514 kB
Tx version: 1 No of confirmations: 3121831 RingCT/type: no
Extra: 02210045b68ac67af7193b7ada814a6ba528e28977aef1567e578f484e595f0962c42101da0a828a327d601aaec8e493cebf402172957c923aaafee165791da209b986b5

7 output(s) for total of 20.582008044686 xmr

stealth address amount amount idx tag
00: 4a0fea24846bb69e25fc1923fd6c61d09cf7d05aa61b20efbb961f92fa3e7af6 0.002008044686 0 of 1 -
01: 89580cdf54bd52aa3446ef090d9f39636c93c90c888aad10e93246cfe3465793 0.010000000000 328051 of 502466 -
02: 8378dfb19134d4cd299c81e0a6c4bb8362bb9120d48774286b5e72b196ff2564 0.070000000000 94245 of 263947 -
03: 5860678419d563e1f63e54eebed082584d406174183503e017fc379da6995e5e 0.500000000000 212188 of 1118624 -
04: fd91ab6c293924c1caa81600b76490f3e5c95a9d6ee856549ed6145276c4bf3e 2.000000000000 69451 of 434057 -
05: fe3ca6c031032312adc0c44f20a35f2fe0e7f3177599e6177de6d6fd3003c2cc 8.000000000000 13334 of 226902 -
06: 9569e49c921f350bb083947ba85436dd2f5ae3e328ae18544a16905e47cee170 10.000000000000 191192 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-08-08 18:39:11 till 2014-08-09 13:33:31; resolution: 0.00 days)

  • |_________________________________________________________________________________________________________________________________________________________________*________|
  • |____________________________________________________________________________________________________________________________________*_____________________________________|
  • |_________*________________________________________________________________________________________________________________________________________________________________|

3 inputs(s) for total of 20.590000000000 xmr

key image 00: 1fb91d01a4f647a4018ddf04a70f7bb5f35241083ce0069710ea362ae5254e6c amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 698d679182c2a1cb73f2d87bb8184f5f99b0959f7aacff7cfde585537dce2f5f 00165847 1 1/7 2014-08-09 12:33:31 10:109:10:31:53
key image 01: 19b4068787d45f4f8dc39fd2778cdd0f4a49ea46d3b0e5054d1c00a0a428e9f1 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d27a93e7545a0489b1bf2fa9c524c05f23cd1660f002861429ce00e52f65f996 00165641 1 5/9 2014-08-09 09:19:32 10:109:13:45:52
key image 02: f9b78ab805aee761701f562cb5990d78931fd6c4f97bb2e2602812bec0a07985 amount: 20.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 68a9ea03cebf89325b8ad8415126ba37cc7921eb4656e35d84e98103f233422a 00164836 1 1/10 2014-08-08 19:39:11 10:110:03:26:13
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 90000000000, "key_offsets": [ 101249 ], "k_image": "1fb91d01a4f647a4018ddf04a70f7bb5f35241083ce0069710ea362ae5254e6c" } }, { "key": { "amount": 500000000000, "key_offsets": [ 210793 ], "k_image": "19b4068787d45f4f8dc39fd2778cdd0f4a49ea46d3b0e5054d1c00a0a428e9f1" } }, { "key": { "amount": 20000000000000, "key_offsets": [ 8788 ], "k_image": "f9b78ab805aee761701f562cb5990d78931fd6c4f97bb2e2602812bec0a07985" } } ], "vout": [ { "amount": 2008044686, "target": { "key": "4a0fea24846bb69e25fc1923fd6c61d09cf7d05aa61b20efbb961f92fa3e7af6" } }, { "amount": 10000000000, "target": { "key": "89580cdf54bd52aa3446ef090d9f39636c93c90c888aad10e93246cfe3465793" } }, { "amount": 70000000000, "target": { "key": "8378dfb19134d4cd299c81e0a6c4bb8362bb9120d48774286b5e72b196ff2564" } }, { "amount": 500000000000, "target": { "key": "5860678419d563e1f63e54eebed082584d406174183503e017fc379da6995e5e" } }, { "amount": 2000000000000, "target": { "key": "fd91ab6c293924c1caa81600b76490f3e5c95a9d6ee856549ed6145276c4bf3e" } }, { "amount": 8000000000000, "target": { "key": "fe3ca6c031032312adc0c44f20a35f2fe0e7f3177599e6177de6d6fd3003c2cc" } }, { "amount": 10000000000000, "target": { "key": "9569e49c921f350bb083947ba85436dd2f5ae3e328ae18544a16905e47cee170" } } ], "extra": [ 2, 33, 0, 69, 182, 138, 198, 122, 247, 25, 59, 122, 218, 129, 74, 107, 165, 40, 226, 137, 119, 174, 241, 86, 126, 87, 143, 72, 78, 89, 95, 9, 98, 196, 33, 1, 218, 10, 130, 138, 50, 125, 96, 26, 174, 200, 228, 147, 206, 191, 64, 33, 114, 149, 124, 146, 58, 170, 254, 225, 101, 121, 29, 162, 9, 185, 134, 181 ], "signatures": [ "5aed2afb3dccf9c7a99c8ab9c9253e2b5d9faa1a2abce60197bbe4dd15ec2302863ae619d1f699580a416abc2c25f20b31c9a955f803fb59b15a9e4fa86f190f", "a929487fd81ce7b066d63f08f2b148d44e6cb92723b1c6e090cf10a56725fa03bf351de5e22ab475d0a86422c10439b55fcd745a9f98732020ab1919a6cf7209", "1ed9652b2eb74d2d26e7896cfb7e917db0df98bc2b6c8544bfa5ccf5b0d8380ad3432dde9c05cd084d56dde33de2e633dd886ce135efa31e2990f2f1cd18900e"] }


Less details
source code | moneroexplorer