Monero Transaction 5302ab05713b6686d1024bd4d6a7fb39f568bd85b5b420712aec6f2964fa5207

Autorefresh is OFF

Tx hash: 5302ab05713b6686d1024bd4d6a7fb39f568bd85b5b420712aec6f2964fa5207

Tx public key: 0ff222df40076608e5c62273cb365d6800ea21e860b4f5b04a3807afa2c225d4
Payment id: 33d88e7d206279eb699e17e495366b117907432d4480e940f9f112ae74e1a9d8

Transaction 5302ab05713b6686d1024bd4d6a7fb39f568bd85b5b420712aec6f2964fa5207 was carried out on the Monero network on 2014-08-16 12:26:17. The transaction has 3119592 confirmations. Total output fee is 0.005963657750 XMR.

Timestamp: 1408191977 Timestamp [UTC]: 2014-08-16 12:26:17 Age [y:d:h:m:s]: 10:112:18:02:44
Block: 175853 Fee (per_kB): 0.005963657750 (0.005940452856) Tx size: 1.0039 kB
Tx version: 1 No of confirmations: 3119592 RingCT/type: no
Extra: 02210033d88e7d206279eb699e17e495366b117907432d4480e940f9f112ae74e1a9d8010ff222df40076608e5c62273cb365d6800ea21e860b4f5b04a3807afa2c225d4

8 output(s) for total of 18.294036342250 xmr

stealth address amount amount idx tag
00: 64b2f2babd59b68d70382aa8805a664e5aae6e1f250e2fbc3ebf992d47545665 0.004036342250 0 of 1 -
01: 6395fa0e63e088b804ef476844c93f60b7681d231d24b91d3bf27c19f2550f89 0.030000000000 164355 of 324336 -
02: c357200cb32175bb27c5fedd4c6789eda5b6f7bb9514c22e80de76f6ea83cd53 0.060000000000 106539 of 264760 -
03: e01f02464857059d8bdda317b0c6c6e92f45db55c3b7bef100f68c9190c885c3 0.300000000000 165766 of 976536 -
04: a1a1fc97d56ac7b1420fa06429517402387d2091f3c9171b2fd08f9d1e902c5e 0.900000000000 93463 of 454894 -
05: f831f4cbd45a0c4333c357aeadca91a16c5cc309a22b760c3e1cbe51ba723a46 2.000000000000 76251 of 434057 -
06: 2756ca678ca056416d3295c8a1510355162caecaa188b585db9251c7aacaa1e5 5.000000000000 104414 of 255089 -
07: cd473fb65efd83d062669a60841ffd2a1f9354d087f16da4580b59694c5dcaab 10.000000000000 202667 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



6 inputs(s) for total of 18.300000000000 xmr

key image 00: 7b62208b200634ceae992bd5b33d8b4276f53f4e692a9c09bdf888426e7d91f8 amount: 0.700000000000
ring members blk
- 00: f6d84f16c7d7586b89fd24d17b63935f224afecdea6723a148e94dd5d4d81d02 00175808
key image 01: 752127dcf2aa2c81a7871525615e7df5de99d18efa7a6948e3952ea4ea317f0a amount: 0.600000000000
ring members blk
- 00: c92c194ab27d53f310878a6ddd2c9f104390a79b0fb8234c9d1c9108c2d5f580 00175670
key image 02: 57832da9d1061f00acb926c32ef27db6185da6d5ac3c5c5f1043e61b49ea7257 amount: 5.000000000000
ring members blk
- 00: f602b6cbbc6ceadc5342697cf2ef4ff5d85338c752b8d4861d07a08184cf94b2 00175627
key image 03: 4d24188a6d4c002fe63dbe59a78ab2e910b4070972aff0790b948454a28d5a2f amount: 2.000000000000
ring members blk
- 00: 90b77c9e76c4a6dc3234cf2a2845211285f869effdbc0931903e704c31b8a166 00174671
key image 04: 3ca79a3fbcfea69e47b2213c942ded7ca93116022b7e200ae1adfb0e432fe792 amount: 2.000000000000
ring members blk
- 00: ca9d866050b8d83623faf845327ad24e6591a0f248894edb68fb9c01c21ae137 00175723
key image 05: 09b58dad035f7feddf675d6e3e842686c1f1bc982efe5124bdd6a0518c523711 amount: 8.000000000000
ring members blk
- 00: 60e2a453112330d5c460b80d83c40f544c3a6313f9e50ce06cdf424cd4fe65da 00175370
More details
source code | moneroexplorer