Monero Transaction 50dc018b3e701cc6306d45c5918234b206c164877ed530725ce1137d75c8da7c

Autorefresh is OFF

Tx hash: 50dc018b3e701cc6306d45c5918234b206c164877ed530725ce1137d75c8da7c

Tx prefix hash: 66cb07d49be69b165419a2ee261ed001f7334919fd41c9d285e052bb8cbe2b5f
Tx public key: b7a5fcdcb499562285a6fec5d9d526f677938f5603483d5bb799fefff6110470

Transaction 50dc018b3e701cc6306d45c5918234b206c164877ed530725ce1137d75c8da7c was carried out on the Monero network on 2014-06-21 01:05:16. The transaction has 3184165 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1403312716 Timestamp [UTC]: 2014-06-21 01:05:16 Age [y:d:h:m:s]: 10:145:19:53:20
Block: 94420 Fee (per_kB): 0.005000000000 (0.013989071038) Tx size: 0.3574 kB
Tx version: 1 No of confirmations: 3184165 RingCT/type: no
Extra: 01b7a5fcdcb499562285a6fec5d9d526f677938f5603483d5bb799fefff6110470

3 output(s) for total of 0.066000000000 xmr

stealth address amount amount idx tag
00: 0bfbbd156063382e7ff089a30d523ca197071f0ca157552b9f78d6a344edc982 0.006000000000 153402 of 256624 -
01: a9806ea0826acb5797c74b68bc0bbfbda61fe1f39fec3a846c6844265380d6a1 0.010000000000 286092 of 502466 -
02: 5785d0712bf1c0fd5bfd8fdb9241cc391a82785b4f7ba3eaf0a1631a3f2fcc15 0.050000000000 90581 of 284521 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-16 17:03:30 till 2014-06-19 19:59:23; resolution: 0.02 days)

  • |___*______________________________________________________________________________________________________________________________________________________________________|
  • |_______________________________________________________________________________________________________________________________________________________________________*__|

2 inputs(s) for total of 0.071000000000 xmr

key image 00: 52e55a7d83ef28b2bd774fe0bbcc2d2c5cccef94804dc7eca1a75e7c4b9c2d92 amount: 0.001000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 195885b882e8847c604cbbc810b4245825ba03cd205882e61fb669c4e42ac721 00088180 1 2/12 2014-06-16 18:03:30 10:150:02:55:06
key image 01: 85831b69d394d6e85c42e4297a476064eb04b374a6cfe40b702854fe1417ae62 amount: 0.070000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ba005bc2c628fe4a618600f521ecceb52b30e2dd5df862647df3e8132a888564 00092629 1 9/9 2014-06-19 18:59:23 10:147:01:59:13
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 1000000000, "key_offsets": [ 43512 ], "k_image": "52e55a7d83ef28b2bd774fe0bbcc2d2c5cccef94804dc7eca1a75e7c4b9c2d92" } }, { "key": { "amount": 70000000000, "key_offsets": [ 68492 ], "k_image": "85831b69d394d6e85c42e4297a476064eb04b374a6cfe40b702854fe1417ae62" } } ], "vout": [ { "amount": 6000000000, "target": { "key": "0bfbbd156063382e7ff089a30d523ca197071f0ca157552b9f78d6a344edc982" } }, { "amount": 10000000000, "target": { "key": "a9806ea0826acb5797c74b68bc0bbfbda61fe1f39fec3a846c6844265380d6a1" } }, { "amount": 50000000000, "target": { "key": "5785d0712bf1c0fd5bfd8fdb9241cc391a82785b4f7ba3eaf0a1631a3f2fcc15" } } ], "extra": [ 1, 183, 165, 252, 220, 180, 153, 86, 34, 133, 166, 254, 197, 217, 213, 38, 246, 119, 147, 143, 86, 3, 72, 61, 91, 183, 153, 254, 255, 246, 17, 4, 112 ], "signatures": [ "279c3258c59a99dffa65e9ce197687869717715a2573c6c3bf646065d343f206f7d23f603a4d434a2bbc1cf8a0bacef78ea794b914aeb73af20e5eba39187709", "7890b0736df984709e77060e6c6128eafb10a9b02d94386de67ed8a991008e0e1eadb140b964ddba551bc141a469584ddeae8d988d24926132e19bdedb49fe0b"] }


Less details
source code | moneroexplorer