Monero Transaction 53412f1b01584f160da603d1cf2d3e9d215e23cb3a0dcd00fca574ebbc5c411a

Autorefresh is OFF

Tx hash: 53412f1b01584f160da603d1cf2d3e9d215e23cb3a0dcd00fca574ebbc5c411a

Tx public key: a0fd63f2b7e58d92d72f6a1635809506d16335fd6798cc377c9ac3b44286cd42

Transaction 53412f1b01584f160da603d1cf2d3e9d215e23cb3a0dcd00fca574ebbc5c411a was carried out on the Monero network on 2014-10-06 09:19:56. The transaction has 3039136 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1412587196 Timestamp [UTC]: 2014-10-06 09:19:56 Age [y:d:h:m:s]: 10:051:11:14:40
Block: 248794 Fee (per_kB): 0.100000000000 (0.061985472155) Tx size: 1.6133 kB
Tx version: 1 No of confirmations: 3039136 RingCT/type: no
Extra: 01a0fd63f2b7e58d92d72f6a1635809506d16335fd6798cc377c9ac3b44286cd42

28 output(s) for total of 20.400000000000 xmr

stealth address amount amount idx tag
00: 6c5140fba085ae9a034dcec6078c2d2088d0f9201e9011ef65fe0f906e41b1f1 0.500000000000 361996 of 1118624 -
01: ef4e5af820d88ed25b466cc1a97625e76001f02b07649e2720cc4e5cbbfce8a3 0.500000000000 361997 of 1118624 -
02: 962d76c8c3ce67e65d9f312a18da79a6435b95eb4ace5d6a301ff2215abcd18f 0.500000000000 361998 of 1118624 -
03: 1d375a7be7bfe6908368301b9ce37e8e9f645f86fb4a86263f0d0fd8fd943096 0.500000000000 361999 of 1118624 -
04: 4a3ee643f80450573fc39091a865823dc413db26740829e86bbc3b1c6a0b347e 0.500000000000 362000 of 1118624 -
05: e873204682637f1aacded896577a65177d9c20b6782847420d3780ce7fa68937 0.500000000000 362001 of 1118624 -
06: be4e48773c281e3e17d177f89f8a0f0f65ca55d15eedb5d82bc2c0f50c2dd387 0.500000000000 362002 of 1118624 -
07: e7d7c1a4d39928bcb615cef38d19a0165f2756b7d3ae073cfe5c803d01ee37a2 0.500000000000 362003 of 1118624 -
08: 6242ae03e6e40db5b6d97cf460bc98413d96cf573a848fecdf1e9125b53fd70b 0.500000000000 362004 of 1118624 -
09: 68921268facabcb1c7f12a7567dd53fea3099ed9bb8eac1451549233283bd58d 0.500000000000 362005 of 1118624 -
10: db67b3d7a383e5b096a01dab51a5caff343644f470083a149fb50d3a28d7c8ce 0.500000000000 362006 of 1118624 -
11: ff732c0c904d1a94cc239e4cdecdcb60173419baded927f297422751dbd4132c 0.600000000000 228054 of 650760 -
12: 5f38fc04b2daab1b95314e6171df3a2308dec49f47eff8bacabca628622860b1 0.600000000000 228055 of 650760 -
13: a7a09092d0a295d70474eb32b57b7d4b85e293723a82d17eec94b50bf857efbb 0.600000000000 228056 of 650760 -
14: ad2e44082094909f580aa84b18d4863ed29068ae8856670af073f6b4a537ccd3 0.600000000000 228057 of 650760 -
15: 120840060b0066e77204c0c601d35d81af661690db3572bfa36452820c34030c 0.600000000000 228058 of 650760 -
16: 6db2ea304f07604c495e0c549dbd1a65067db40154a2ffc6b560535de6c8e5fc 0.600000000000 228059 of 650760 -
17: b222b67c42cfebc365188b290a5359385a780b9c0bc1ecba697df5ea3b658f4b 0.700000000000 166926 of 514467 -
18: c3529bb261844313bee4888582c54e494dbeb9bc3b40d177669bc79b5d61f540 0.700000000000 166927 of 514467 -
19: d91bedab54772cdf4a2d275641993c04532d253a8981061a5f19a4bb0124056f 0.700000000000 166928 of 514467 -
20: 32950fafe60a3ceb163a0e14750e8ea95322ff63d057b5ddf9bff878781cd49f 0.700000000000 166929 of 514467 -
21: 11dbc6d0473b4703c67b01334326952f0e05d0f30ce075711020885c66a5ff90 0.800000000000 170357 of 489955 -
22: 05083b08767e97746307dba104e18a323af9ffd77fbeb92491217f45480301c3 0.800000000000 170358 of 489955 -
23: d8cd00922626dd0a35730410c2cace04353f2a0f64971b13ec520dc393bfcdfb 0.900000000000 138969 of 454894 -
24: 20e7a23ad8b1754802297e3823d48686aa9ee85d3ca1dced109ef6f46e8da1c9 1.000000000000 292169 of 874629 -
25: ed807fd56f9133da06ae7354dfd576c32a04de4df3968c199fac1114d66c2c5f 1.000000000000 292170 of 874629 -
26: 572b207752a37e07db2caf56414be7f57f3b7de68b35f696a7e0f5027b94d525 1.000000000000 292171 of 874629 -
27: e8976883367e518ad3c7b91893eb37afc580be50ddaf4ed0c3b7884a2e8d28d4 3.000000000000 72532 of 300495 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



3 inputs(s) for total of 20.500000000000 xmr

key image 00: c267e3c78ad1fb9eed551dde8561da81e72cbd6f4b186f7b87903ac2f2647e2f amount: 0.500000000000
ring members blk
- 00: 5f47e8fd4135acf2df48d73b96a010e0ffccb52ec07dc0f4e41b11bb117c2a49 00066788
- 01: 7dcd4754c376244158ad0112e61d58a6836715382f4761a6dbf2aa83dba58e2c 00201164
key image 01: e307dfef6c891171f616821c0827be545998c03c5a8274ea4860e70427afa3a0 amount: 10.000000000000
ring members blk
- 00: bc0138d7d208f71fa7a537e6f3e79ae11b96f7e3667906e0d91f009c56f90883 00149928
- 01: 7641ae51ce360484c7ad40bf47d2114a7ccee137a6a176fec50d54eefe4b167b 00235206
key image 02: 880d461d3b058299c4d9ccc3d30186f0459c8763003979d7773e8ea518f96218 amount: 10.000000000000
ring members blk
- 00: 2593dcd7b9bfa2644bcb537ed10e0c220123111062e5426a2e26c29f96d2b135 00009124
- 01: d9e6fd7319f387ee4b4f35e7912e6b0032fcfaf02912533cc30a825c8eb4925b 00214714
More details
source code | moneroexplorer