Monero Transaction 53b8bd7f4adb7b867840b96467aec773a0a27d4c875384c52d672881157ed60d

Autorefresh is OFF

Tx hash: 53b8bd7f4adb7b867840b96467aec773a0a27d4c875384c52d672881157ed60d

Tx prefix hash: a834fe0e00cdd632e2eb4674338add6fd447e9a76c355e8e7c89e50818237ca2
Tx public key: fb255e41912ab104ff6a92aafb38e6f2efc4def3990fafda697632dc38f54ee4
Payment id: 11f904bbe2d82e9270416311dd6cbf3c980d435d5e07227f38fe8fde280113aa

Transaction 53b8bd7f4adb7b867840b96467aec773a0a27d4c875384c52d672881157ed60d was carried out on the Monero network on 2014-11-12 14:46:49. The transaction has 2999355 confirmations. Total output fee is 0.138643810000 XMR.

Timestamp: 1415803609 Timestamp [UTC]: 2014-11-12 14:46:49 Age [y:d:h:m:s]: 10:032:18:39:28
Block: 301864 Fee (per_kB): 0.138643810000 (0.177021522993) Tx size: 0.7832 kB
Tx version: 1 No of confirmations: 2999355 RingCT/type: no
Extra: 02210011f904bbe2d82e9270416311dd6cbf3c980d435d5e07227f38fe8fde280113aa01fb255e41912ab104ff6a92aafb38e6f2efc4def3990fafda697632dc38f54ee4

5 output(s) for total of 8.411756190000 xmr

stealth address amount amount idx tag
00: 6e5551cfc35c04440daba1e14eb0c45ee53bcc6a433fd7c508aac2f09ba250ea 0.011756190000 0 of 1 -
01: d628dcf63735704dc07ec5cb2f760257be5260dd9897ceb4d8a434d5d7a00543 0.700000000000 199691 of 514467 -
02: d043a8879314091c688bd79c40e4a645145a3e616e3372e1b0fd306bbcb8fe11 0.700000000000 199692 of 514467 -
03: db77979311110ea94f64edc852949de0ca3aec2aa58cbf3bd5610e3c8f6fd3ae 2.000000000000 128696 of 434058 -
04: 3041f3d6eb598b242d6c8dc25a1ce0575e4af912a35009dff26533438e4e6b28 5.000000000000 122741 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-09-21 09:02:13 till 2014-11-05 18:48:15; resolution: 0.27 days)

  • |____________________________________________________________________________________________________________________________________________________*_____________________|
  • |__________________________________________________________________________________________________________________________________________*_______________________________|
  • |___________________________________________________________________________________________________________________________________________________*______________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_*________________________________________________________________________________________________________________________________________________________________________|

5 inputs(s) for total of 8.550400000000 xmr

key image 00: 411d4dfc5e9dbec191cf444149b04806f8bf349ceca6a69148467c886a044f3c amount: 0.050400000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a6264c7b770623180b50af5573a1ace9ae51c46bcf48ed2fa274eef90ba1ac86 00283817 1 1/3 2014-10-30 23:32:14 10:045:09:54:03
key image 01: 570dc4159e83b17e7d105f6fcce531b3c1dbd434cd816d2c4fadcb8c9bf9845a amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 29c4ad3ab05852030f11d0aebeb9e79807d24c02c06810e1ca2471956be8d4c8 00279985 1 2/3 2014-10-28 07:11:05 10:048:02:15:12
key image 02: 7e33dfa2a52a977d651acc564e2c9e70890e9dd86c3ea894206d0e2325df5d70 amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3ea2b650c6dbccc05e1170c522fda4ac9bad551bd89fc99cdcea71a8356c6808 00283561 1 2/5 2014-10-30 18:24:47 10:045:15:01:30
key image 03: f0dd84d72c61dd139cef7767334507cfbd37a8b502e945dcfb1f21f02df64b92 amount: 0.600000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4b3674eac6809a8a21811bcc42c297d2d11aa8e3bcda22aa8c2de9dc31bc4494 00292028 1 1/5 2014-11-05 17:48:15 10:039:15:38:02
key image 04: eba28c2ed64d805fba4b3a9ae139c723133632e34cd9aa6b7eece2b5e466dcb6 amount: 6.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 31e931fc69fd44db7ada68674f765ee0c4a2f02a976e7561bec5eb0493cbb0b8 00227378 1 3/2 2014-09-21 10:02:13 10:084:23:24:04
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 50400000000, "key_offsets": [ 0 ], "k_image": "411d4dfc5e9dbec191cf444149b04806f8bf349ceca6a69148467c886a044f3c" } }, { "key": { "amount": 900000000000, "key_offsets": [ 151807 ], "k_image": "570dc4159e83b17e7d105f6fcce531b3c1dbd434cd816d2c4fadcb8c9bf9845a" } }, { "key": { "amount": 1000000000000, "key_offsets": [ 321058 ], "k_image": "7e33dfa2a52a977d651acc564e2c9e70890e9dd86c3ea894206d0e2325df5d70" } }, { "key": { "amount": 600000000000, "key_offsets": [ 266075 ], "k_image": "f0dd84d72c61dd139cef7767334507cfbd37a8b502e945dcfb1f21f02df64b92" } }, { "key": { "amount": 6000000000000, "key_offsets": [ 82215 ], "k_image": "eba28c2ed64d805fba4b3a9ae139c723133632e34cd9aa6b7eece2b5e466dcb6" } } ], "vout": [ { "amount": 11756190000, "target": { "key": "6e5551cfc35c04440daba1e14eb0c45ee53bcc6a433fd7c508aac2f09ba250ea" } }, { "amount": 700000000000, "target": { "key": "d628dcf63735704dc07ec5cb2f760257be5260dd9897ceb4d8a434d5d7a00543" } }, { "amount": 700000000000, "target": { "key": "d043a8879314091c688bd79c40e4a645145a3e616e3372e1b0fd306bbcb8fe11" } }, { "amount": 2000000000000, "target": { "key": "db77979311110ea94f64edc852949de0ca3aec2aa58cbf3bd5610e3c8f6fd3ae" } }, { "amount": 5000000000000, "target": { "key": "3041f3d6eb598b242d6c8dc25a1ce0575e4af912a35009dff26533438e4e6b28" } } ], "extra": [ 2, 33, 0, 17, 249, 4, 187, 226, 216, 46, 146, 112, 65, 99, 17, 221, 108, 191, 60, 152, 13, 67, 93, 94, 7, 34, 127, 56, 254, 143, 222, 40, 1, 19, 170, 1, 251, 37, 94, 65, 145, 42, 177, 4, 255, 106, 146, 170, 251, 56, 230, 242, 239, 196, 222, 243, 153, 15, 175, 218, 105, 118, 50, 220, 56, 245, 78, 228 ], "signatures": [ "623ea37b2cb7f59b01dc12ed4d1ccd94d92648702a02de94e161249817004300a702c43935de6c10deea224c41e6fd12642ff8fb94607da2b368a7d66967fa09", "b0e72f006571bba665ba54608a42b793219f9b16d77e4b39ea2fab2bd9a24200278887cfe0180d3d6346a9a0e6e20d1fa1c75e70c92251005d468bd9bb406b0d", "564644a0d623f1a86b4947ca18d18c1aa42a6de52e851b3431b7d793f57c750334aa9a2e3936e073e7fc993d8ae96238241f03f99a0e4435bad235d9f93ea106", "c548e3fbf416fbda6e20e8c41ed106affe6b4f536a1e1678ee57557c75aa890c917491f28b1e7f83ef501b45f459bd3ea555db86ea3d56736b36f9455e8f4200", "1cf4e6e643911b4044084ccd7ddb121223d599de14e0a4f6b70a72bee92e1e01a641d42187bdffc51ef9d5dcfc12087cbf56d609c7a831713f54bf8904d8eb02"] }


Less details
source code | moneroexplorer