Monero Transaction 5203db6ad8df3e182dc14024f741f9a9b88afb20154d520ebc803c113b175b07

Autorefresh is OFF

Tx hash: 5203db6ad8df3e182dc14024f741f9a9b88afb20154d520ebc803c113b175b07

Tx prefix hash: 5db688ab5890115ee62ec6cc9355631a88ad3781e9ccd2e21e8527b1fb07fa98
Tx public key: 1b0201c11e8dea7302d2188b74129001a1809c1bf40e711bc68abfd804c89b6c
Payment id: 6fb99634f7905bd0dda0296010a5aa04b2b4fe0bfbfe008effedc9507eecdeba

Transaction 5203db6ad8df3e182dc14024f741f9a9b88afb20154d520ebc803c113b175b07 was carried out on the Monero network on 2016-12-22 20:39:49. The transaction has 2096394 confirmations. Total output fee is 0.002000000000 XMR.

Timestamp: 1482439189 Timestamp [UTC]: 2016-12-22 20:39:49 Age [y:d:h:m:s]: 07:359:19:34:36
Block: 1207214 Fee (per_kB): 0.002000000000 (0.003567944251) Tx size: 0.5605 kB
Tx version: 1 No of confirmations: 2096394 RingCT/type: no
Extra: 0221006fb99634f7905bd0dda0296010a5aa04b2b4fe0bfbfe008effedc9507eecdeba011b0201c11e8dea7302d2188b74129001a1809c1bf40e711bc68abfd804c89b6c

5 output(s) for total of 0.398000000000 xmr

stealth address amount amount idx tag
00: 00fd5a0110e11247ad9446b6209c2e9cb0c9060f68e38509b191b4aa37b2c2ed 0.001000000000 87682 of 100400 -
01: 758b8fdc6c35bce86f4bf2205f8f8b1dcf0b1b381a303ef6632d46287108ca32 0.007000000000 234890 of 247341 -
02: 15def208655cf9a6ac0e4665c9af341b677f5a213211df1b13d2047f1bd9bc5d 0.090000000000 297347 of 317822 -
03: 0cae2fd9f9265bad91162e49369d6289cc643f5efff31723d389152dc2893b27 0.100000000000 959758 of 982315 -
04: 0a4a45ce2e8355b794a7c3d703883c6e127142af88fbdf650b0bcfb7ce9f8a32 0.200000000000 1238701 of 1272211 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-08 11:08:57 till 2016-12-17 17:58:06; resolution: 5.43 days)

  • |_*_*____*________________________________________________________________________________________________________________________________________________________________*|

1 inputs(s) for total of 0.400000000000 xmr

key image 00: b16dfd872bcf13b94c6c6f25833cdaf8c82158bd3f2e639036eac2f52313da8e amount: 0.400000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c8c6c3cce64688de27b59aa835007dcaea1a9a81bf7c721c16fb3538d1eb3882 00076142 1 8/134 2014-06-08 12:08:57 10:193:04:05:28
- 01: 069552db6bfbb3ea0bee8c0460e11b91c583222f6636b82e76dd9a349c16e661 00094606 1 11/153 2014-06-21 04:07:04 10:180:12:07:21
- 02: 3dae990f420c6571d83ef8dfe99df28582fde8f4710e67de5f0666479c0ce48a 00138314 0 0/5 2014-07-21 09:40:32 10:150:06:33:53
- 03: a43983fa16338d29a4fdc6b8c96af885b16f69c0fa0ceda2a6740f5794e62d66 01203522 5 16/20 2016-12-17 16:58:06 07:364:23:16:19
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 400000000000, "key_offsets": [ 22511, 18638, 59847, 566904 ], "k_image": "b16dfd872bcf13b94c6c6f25833cdaf8c82158bd3f2e639036eac2f52313da8e" } } ], "vout": [ { "amount": 1000000000, "target": { "key": "00fd5a0110e11247ad9446b6209c2e9cb0c9060f68e38509b191b4aa37b2c2ed" } }, { "amount": 7000000000, "target": { "key": "758b8fdc6c35bce86f4bf2205f8f8b1dcf0b1b381a303ef6632d46287108ca32" } }, { "amount": 90000000000, "target": { "key": "15def208655cf9a6ac0e4665c9af341b677f5a213211df1b13d2047f1bd9bc5d" } }, { "amount": 100000000000, "target": { "key": "0cae2fd9f9265bad91162e49369d6289cc643f5efff31723d389152dc2893b27" } }, { "amount": 200000000000, "target": { "key": "0a4a45ce2e8355b794a7c3d703883c6e127142af88fbdf650b0bcfb7ce9f8a32" } } ], "extra": [ 2, 33, 0, 111, 185, 150, 52, 247, 144, 91, 208, 221, 160, 41, 96, 16, 165, 170, 4, 178, 180, 254, 11, 251, 254, 0, 142, 255, 237, 201, 80, 126, 236, 222, 186, 1, 27, 2, 1, 193, 30, 141, 234, 115, 2, 210, 24, 139, 116, 18, 144, 1, 161, 128, 156, 27, 244, 14, 113, 27, 198, 138, 191, 216, 4, 200, 155, 108 ], "signatures": [ "2ea961f90cf19f5aee1ae08e485a61713defb2e5bd5d1b9f17294bb1b041d70c974e3595323f9539eafd0fb277643d81038059c0864a8b07bd0414297fa93b05f570e7c9a58c568b2cccff9e92e0b418a427202092bfdb780caf16d24ca7870d68da687915f4b7e036f9637098f82cec1df8f34dc26b2ceabdb8464b73af6c00f971925c675f2de8b9bcf059e1b720c06f85b8ea233ec2b64b081f19b22a8b0cf53c72c7cfb25804451d34d0a37113a813025c80a23f34322cd99af8be05240a9ef3bbff0f6921c9c1e43ea6e7d6a12cabca1d4580f1b9789a82ea6b6181e80347f66bd9100ab0e2ca6baaa3d11efe04b6bd7aa6ba6dfc2c4e1b5a8e30f4fc02"] }


Less details
source code | moneroexplorer