Monero Transaction 530c2b0df6c0fa1b2b66509d6edb43e8808c169597e8d3d9d1316062b5719849

Autorefresh is OFF

Tx hash: 530c2b0df6c0fa1b2b66509d6edb43e8808c169597e8d3d9d1316062b5719849

Tx prefix hash: 2a0d3e8b5408a26e0ce44a4995b3c06550761b3804ea12f277742ced6235ee8b
Tx public key: 24e70e12a0a6847fca61f1cbfe924d85f6a4eac3a0c4b671ff7e9e89147d10fe
Payment id: e19a63bc149c4c448757f601b11db8db66bfb54d020f41a298dc6adb2c738e75

Transaction 530c2b0df6c0fa1b2b66509d6edb43e8808c169597e8d3d9d1316062b5719849 was carried out on the Monero network on 2016-09-29 05:50:12. The transaction has 2161639 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1475128212 Timestamp [UTC]: 2016-09-29 05:50:12 Age [y:d:h:m:s]: 08:085:10:32:59
Block: 1146282 Fee (per_kB): 0.010000000000 (0.013800539084) Tx size: 0.7246 kB
Tx version: 1 No of confirmations: 2161639 RingCT/type: no
Extra: 0124e70e12a0a6847fca61f1cbfe924d85f6a4eac3a0c4b671ff7e9e89147d10fe022100e19a63bc149c4c448757f601b11db8db66bfb54d020f41a298dc6adb2c738e75de208f4134b4124a8b23403df1829ae9476ad2a7ccf2f1acb52ab3f7610106f0fe3b

4 output(s) for total of 0.698000000000 xmr

stealth address amount amount idx tag
00: 9c820b0902151f54694d7fe624c6e2dbca1d48e23731d001a739ecad60808f88 0.008000000000 208007 of 245068 -
01: ac443683ac2881c45e9f3e3b36288969ddcf084a70fb85f8a5a4cd8d781d968b 0.010000000000 461266 of 502466 -
02: fb8d166229662cec9ea33dce9d1c8b25083d7a2352712566bd62669376dc2c93 0.080000000000 231986 of 269576 -
03: 704964860bda17cc8083ae1aa051636c1fd2d7f418cdccd4c7a4ead92af2d512 0.600000000000 608598 of 650760 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-06 06:12:34 till 2016-09-29 04:01:41; resolution: 4.98 days)

  • |_*_____________*_________________________________________________________________________________________________________________________________________________________*|
  • |_________________________________________________*_______________________________*_______________________________________________________________________________________*|

2 inputs(s) for total of 0.708000000000 xmr

key image 00: 232749b42a2b1cf258635d1d3d25217f8e3c37557db2d279e021b015d7d5cf61 amount: 0.008000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7d43aff45eb4fc32b601d1cd430295a092f3c74a6f3ceb909e34f18b1099f114 00072986 1 5/30 2014-06-06 07:12:34 10:201:09:10:37
- 01: c59689ec65aea8bea6b15746c14ccc8c61995342c0c8f606c00004eccc50d859 00178395 2 20/121 2014-08-18 07:51:04 10:128:08:32:07
- 02: 4eac0e3e418ec03b656697bb73ae5fdd2db4c9afe53e32daa66e2e10234f2ea8 01146123 3 1/21 2016-09-28 23:50:26 08:085:16:32:45
key image 01: 60630048139f15424710abab0a1a0932ff2a500f16697fecccfb4a473d90fa3c amount: 0.700000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 68d18e01b787e5f8bb44b11aa8be0a3bbd9872937e57a092a25c2a278b4a43e8 00421274 1 36/89 2015-02-04 07:56:25 09:323:08:26:46
- 01: 8da138c0c4364884607d55c41eb35058f2922655726d2a85ceed9c02dd9966ee 00646775 1 4/4 2015-07-11 20:51:17 09:165:19:31:54
- 02: cbc93e5703296cd8093d39099d2582e84ec90a15bf8bbb89c760d5d6b764e520 01146209 3 2/23 2016-09-29 03:01:41 08:085:13:21:30
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 8000000000, "key_offsets": [ 47787, 121243, 38949 ], "k_image": "232749b42a2b1cf258635d1d3d25217f8e3c37557db2d279e021b015d7d5cf61" } }, { "key": { "amount": 700000000000, "key_offsets": [ 254714, 83925, 136056 ], "k_image": "60630048139f15424710abab0a1a0932ff2a500f16697fecccfb4a473d90fa3c" } } ], "vout": [ { "amount": 8000000000, "target": { "key": "9c820b0902151f54694d7fe624c6e2dbca1d48e23731d001a739ecad60808f88" } }, { "amount": 10000000000, "target": { "key": "ac443683ac2881c45e9f3e3b36288969ddcf084a70fb85f8a5a4cd8d781d968b" } }, { "amount": 80000000000, "target": { "key": "fb8d166229662cec9ea33dce9d1c8b25083d7a2352712566bd62669376dc2c93" } }, { "amount": 600000000000, "target": { "key": "704964860bda17cc8083ae1aa051636c1fd2d7f418cdccd4c7a4ead92af2d512" } } ], "extra": [ 1, 36, 231, 14, 18, 160, 166, 132, 127, 202, 97, 241, 203, 254, 146, 77, 133, 246, 164, 234, 195, 160, 196, 182, 113, 255, 126, 158, 137, 20, 125, 16, 254, 2, 33, 0, 225, 154, 99, 188, 20, 156, 76, 68, 135, 87, 246, 1, 177, 29, 184, 219, 102, 191, 181, 77, 2, 15, 65, 162, 152, 220, 106, 219, 44, 115, 142, 117, 222, 32, 143, 65, 52, 180, 18, 74, 139, 35, 64, 61, 241, 130, 154, 233, 71, 106, 210, 167, 204, 242, 241, 172, 181, 42, 179, 247, 97, 1, 6, 240, 254, 59 ], "signatures": [ "904f6a163b48b6deedb15c83e175e26beddcdcd7bfd9607452b05a9f07effb0614ad231a6ce47eb2a9404fdfcfa63f01c9e9e2f6955d8dba0192ace6be16f3093385aa394fe385bea3e0fcbca9239ff542d2f7d5c496d286c24e9ee4f8b2d5017932b11d6caac3feea030266f0944681a26538b25e0c2ba71741bdece5d4d508944cc298d2a091af8f9d5130c360beabb7bb1d9a544515034fad1b86f65616002265ff53cd70ec4baf3ad221e0134e94f9781b64f01bfe352401ac09d8c7d704", "8e4d7135b8e538b88995b364d520dd8f6410decc0881d60db39cafe4ca1ba2062765ee8f42a150fa6c65d3e1aa388da112866896b9703be634f6a47e8622070f92cee925adeebd7908ad74c0ef6eda039ce3f84e753ab6b67eb01194e6467e07ecd9714ebf51b611ce7fee260e4b8b59cca9c0def89b1a8f093c2a6ba208a60bcbcca5e74eaac97e3f5d061643bb05ee211019f07c08a026ca61a8be12d14908c69ec81478f8d09ef932c531812e0bd1b91e4e56b6fda89cddf7d44670025f0d"] }


Less details
source code | moneroexplorer