Monero Transaction 51e2a89e84d82b01bf6d1fc78df33008ddacbb3e1b53dc1bddb68e2274b774b7

Autorefresh is OFF

Tx hash: 51e2a89e84d82b01bf6d1fc78df33008ddacbb3e1b53dc1bddb68e2274b774b7

Tx prefix hash: 169171190c076b33976899787f6f030fc70c04abc177be89b66ea9c6cc4b16c2
Tx public key: 121a34b3e3b0fd9538f52ab5e0f7a8c570fcf382e55b5ef4503aa3fa4c1e3357
Payment id: b2d5821740d9f435163e255e2b709f5d0866d04b30cae7f08cb9a3c08dbbf384

Transaction 51e2a89e84d82b01bf6d1fc78df33008ddacbb3e1b53dc1bddb68e2274b774b7 was carried out on the Monero network on 2014-12-12 06:30:01. The transaction has 2957195 confirmations. Total output fee is 0.020000000000 XMR.

Timestamp: 1418365801 Timestamp [UTC]: 2014-12-12 06:30:01 Age [y:d:h:m:s]: 10:003:06:28:52
Block: 344145 Fee (per_kB): 0.020000000000 (0.031124620061) Tx size: 0.6426 kB
Tx version: 1 No of confirmations: 2957195 RingCT/type: no
Extra: 022100b2d5821740d9f435163e255e2b709f5d0866d04b30cae7f08cb9a3c08dbbf38401121a34b3e3b0fd9538f52ab5e0f7a8c570fcf382e55b5ef4503aa3fa4c1e3357

4 output(s) for total of 7.130000000000 xmr

stealth address amount amount idx tag
00: b548ac13a0dba632e739cc5e5985957df2178e073466291fa83bb3a21f6ebe3c 0.030000000000 177037 of 324336 -
01: 16b794b99717c1f56396bccc7da7b85b3c35692007556fd6dfa14fe7bbbd922d 0.100000000000 668781 of 982315 -
02: 15988e67a5e6229d60cefddca52d873632f6fa9617f29aba2617e54d769c4dfd 2.000000000000 162450 of 434058 -
03: 79f681ad05d14d225cd9ad9fba1ac88e39427bfd3d5119fe4ce3af2d1dbfc0fa 5.000000000000 132251 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-12-11 15:05:49 till 2014-12-12 05:58:08; resolution: 0.00 days)

  • |______________________________________________________________________________________________________________________________________________________________*___________|
  • |__________________________________________________________________________________________________________________________*_______________________________________________|
  • |_______________________________________________________________________________________________*__________________________________________________________________________|
  • |____________*_____________________________________________________________________________________________________________________________________________________________|

4 inputs(s) for total of 7.150000000000 xmr

key image 00: e7592c70d1c1f72257a5725566c32666eee2af1d7378ae7d27073c2efa997fbd amount: 0.060000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b260ec4b115ed9b7ae43fa2e2e658046941a3caa5ce4a70e36651e1e80ede55e 00344031 1 10/7 2014-12-12 04:58:08 10:003:08:00:45
key image 01: 927210b9158519bab7f37f2732f89465982f98565fe786bb314a40d68ff66c40 amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c74dc260fa449de9dac38344cf311c36f5cf191b528f7edea9bc7bf2684b7a26 00343838 0 0/4 2014-12-12 01:49:49 10:003:11:09:04
key image 02: 6fa2d529bc5cc152f5124f99a21e46bcf4d5aae1b4d7da2a0ed33f352a1ae786 amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 545bfacf38ad86dab3e496e7c9a8072db6395ef5e7b10912166f4f9398e7746c 00343710 1 2/5 2014-12-11 23:22:55 10:003:13:35:58
key image 03: 02f7432848d400315efd8fd5a3cd8a529e90fc70aca339a0feb446d2a7716c10 amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 2c3b8c5407f9b2187991a228281dbc9bf122bef2f83a9f67aa17b32b865ffdc8 00343345 1 3/56 2014-12-11 16:05:49 10:003:20:53:04
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 60000000000, "key_offsets": [ 118210 ], "k_image": "e7592c70d1c1f72257a5725566c32666eee2af1d7378ae7d27073c2efa997fbd" } }, { "key": { "amount": 2000000000000, "key_offsets": [ 162071 ], "k_image": "927210b9158519bab7f37f2732f89465982f98565fe786bb314a40d68ff66c40" } }, { "key": { "amount": 90000000000, "key_offsets": [ 126271 ], "k_image": "6fa2d529bc5cc152f5124f99a21e46bcf4d5aae1b4d7da2a0ed33f352a1ae786" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 132090 ], "k_image": "02f7432848d400315efd8fd5a3cd8a529e90fc70aca339a0feb446d2a7716c10" } } ], "vout": [ { "amount": 30000000000, "target": { "key": "b548ac13a0dba632e739cc5e5985957df2178e073466291fa83bb3a21f6ebe3c" } }, { "amount": 100000000000, "target": { "key": "16b794b99717c1f56396bccc7da7b85b3c35692007556fd6dfa14fe7bbbd922d" } }, { "amount": 2000000000000, "target": { "key": "15988e67a5e6229d60cefddca52d873632f6fa9617f29aba2617e54d769c4dfd" } }, { "amount": 5000000000000, "target": { "key": "79f681ad05d14d225cd9ad9fba1ac88e39427bfd3d5119fe4ce3af2d1dbfc0fa" } } ], "extra": [ 2, 33, 0, 178, 213, 130, 23, 64, 217, 244, 53, 22, 62, 37, 94, 43, 112, 159, 93, 8, 102, 208, 75, 48, 202, 231, 240, 140, 185, 163, 192, 141, 187, 243, 132, 1, 18, 26, 52, 179, 227, 176, 253, 149, 56, 245, 42, 181, 224, 247, 168, 197, 112, 252, 243, 130, 229, 91, 94, 244, 80, 58, 163, 250, 76, 30, 51, 87 ], "signatures": [ "6d2f87a26c34c5d0b9f018455df80510d71de2e31aca128032b37a0639f6f001159793f8425cce2342d518a39e5226bffc4151d00f61d5e81a317203e6d52e08", "75c9db9d1963b924fe784dd0ec19c6932c07b20156f426fabd5e2d5a6f926e06dd9d26c15f01d852dc9eb0ae2713f28a61977203c2e8e4478a889da8891dfe02", "a5b9ab2e9b32aa3e7aa4752d736bc084bfd1f21da7c38f1d087d304379e4020260d1f882b67ba1f984a586b1125c1ba5dcd59acc3fcc759cd96e4c40453d5b0f", "c1ada30272b046e9e77ff19d8a195403d29d38853d102e3f375c41dc3e9e230e0baaa47b8c9a55ddbed6e5603672b90d6c53b457a1a6171d2ddde3a9f0d68e03"] }


Less details
source code | moneroexplorer