Monero Transaction 529a78518f76bf7e182789993865410086ddcf723bc83ec84c08e012567c4b21

Autorefresh is OFF

Tx hash: 529a78518f76bf7e182789993865410086ddcf723bc83ec84c08e012567c4b21

Tx prefix hash: a6537454efbefd133ab8ca70252bc49dfa41d84c8d4d5ecfd0fc1d8459c395d3
Tx public key: 30ce159c0be164e1576155eb4dd9eaef86d8747e3f08c2bc8cf1dfae6cd45b2c

Transaction 529a78518f76bf7e182789993865410086ddcf723bc83ec84c08e012567c4b21 was carried out on the Monero network on 2016-11-07 06:53:09. The transaction has 2121713 confirmations. Total output fee is 0.002000000000 XMR.

Timestamp: 1478501589 Timestamp [UTC]: 2016-11-07 06:53:09 Age [y:d:h:m:s]: 08:029:17:47:33
Block: 1174242 Fee (per_kB): 0.002000000000 (0.002817056396) Tx size: 0.7100 kB
Tx version: 1 No of confirmations: 2121713 RingCT/type: no
Extra: 0130ce159c0be164e1576155eb4dd9eaef86d8747e3f08c2bc8cf1dfae6cd45b2c

2 output(s) for total of 0.201000000000 xmr

stealth address amount amount idx tag
00: 0316fd91b23316a601cab7b62ab3bd0664a64b868ab3a8b2f6aef1f87cd4d07a 0.001000000000 75879 of 100400 -
01: dbe4a25f8b9302a22799e33a9889ae05d5889de51ee0d9d04122712f986dc948 0.200000000000 1207050 of 1272210 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-04-27 21:05:55 till 2016-11-07 06:43:31; resolution: 5.44 days)

  • |____________________*_____________________*_______*______________________________________________________________________________________________________________________*|
  • |_*___**__________________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 0.203000000000 xmr

key image 00: fa5586992e1af6f31a8a2a24c7bb37f46e5a0fa1b25891f1203d804ff1ef42da amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8e0508629f460740c482c0952742f173462ff8ebde84ddd802e7015594082385 00173554 1 13/37 2014-08-14 22:38:45 10:115:02:01:57
- 01: 63e936d48cc8283d237e2ad3e437086e4f8b2e9644311b38a33235a6fb65e0dd 00346175 1 11/55 2014-12-13 14:32:59 09:359:10:07:43
- 02: b1724463e6aa6a8e37f5088f2a980b37c0e72729e219bbc1ee1e7b7374321d1d 00402646 1 13/58 2015-01-22 07:55:56 09:319:16:44:46
- 03: 1b7d29d8c56e3292c1b9eea1d58c6193bdd528e186f91a1f68b701452c20d256 01174212 3 1/24 2016-11-07 05:43:31 08:029:18:57:11
key image 01: 5683a331426153e876cfbae10e14f31877bc980aa5e8979d100fa990007f7add amount: 0.003000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 904bb84fb812ba8710f698f485f0007b385d8602e792fa245c254cf1b873f812 00014344 0 0/9 2014-04-27 22:05:55 10:224:02:34:47
- 01: da18782d54fa41aec59702b2ac07f9468e453015902910321e66f4d475186429 00055439 1 21/197 2014-05-25 04:26:27 10:196:20:14:15
- 02: 936834cb141733054fa881ddf3b5908e89aec1a9d59e9b4aa6291edb124c75d8 00055953 1 13/88 2014-05-25 13:29:34 10:196:11:11:08
- 03: e3922e4497d266347f765e0f13c22ea4438d331f70866a6d3836f6b68dca511a 01174212 3 1/24 2016-11-07 05:43:31 08:029:18:57:11
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 200000000000, "key_offsets": [ 365080, 313241, 70879, 457834 ], "k_image": "fa5586992e1af6f31a8a2a24c7bb37f46e5a0fa1b25891f1203d804ff1ef42da" } }, { "key": { "amount": 3000000000, "key_offsets": [ 1432, 13542, 788, 51513 ], "k_image": "5683a331426153e876cfbae10e14f31877bc980aa5e8979d100fa990007f7add" } } ], "vout": [ { "amount": 1000000000, "target": { "key": "0316fd91b23316a601cab7b62ab3bd0664a64b868ab3a8b2f6aef1f87cd4d07a" } }, { "amount": 200000000000, "target": { "key": "dbe4a25f8b9302a22799e33a9889ae05d5889de51ee0d9d04122712f986dc948" } } ], "extra": [ 1, 48, 206, 21, 156, 11, 225, 100, 225, 87, 97, 85, 235, 77, 217, 234, 239, 134, 216, 116, 126, 63, 8, 194, 188, 140, 241, 223, 174, 108, 212, 91, 44 ], "signatures": [ "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", "778e0ba31ad413f8c2f07a4ca80591f6b230b15a5ddb192e604499e3fa6fdd030e430ddc01581da0112a4ad67cc25b0161877721d5f392efd759634ccc57d0070e029a92fb6f4f7b9043cdafbd0c709a4eaf77c2eb2f2dcd9a2d47f64381b80913009c327b98a6a9e6f9652cda1c006ee3feeab87e4bb718d5b9b04e4de59b0253193d1705da05f5a33389cdb0828b06bd3a06e716c11551234783e04b4a110659cd8c421d2ac4fc612855c935d29316d739da765be920e2355b6d8f628d4a05379ceb818aed45fc45181c900cd8cab58b9e831c4e076391ca5712dfe28e34057a7013e8c370100f7b07b181cc919949acebbb19ac7fad6d059761b432bc7406"] }


Less details
source code | moneroexplorer