Monero Transaction 53d0318b0517316f9d7f1ebbef610fa1a2a16e4c6edfdbced2767600bc4de1b9

Autorefresh is OFF

Tx hash: 53d0318b0517316f9d7f1ebbef610fa1a2a16e4c6edfdbced2767600bc4de1b9

Tx prefix hash: 5851d88411c367004c682083372fba048f4f8f08f90db416fc2fb684bcef2b5c
Tx public key: 4fc1a3a172bd1c8cc9a71533966e397d69d20c952a974e96206e96ba7863f37b
Payment id: 910aa57c26222479e8175fd990b8115e0f20586731ba671be1994d3ce25cbe26

Transaction 53d0318b0517316f9d7f1ebbef610fa1a2a16e4c6edfdbced2767600bc4de1b9 was carried out on the Monero network on 2014-08-02 07:30:53. The transaction has 3122683 confirmations. Total output fee is 0.005332570000 XMR.

Timestamp: 1406964653 Timestamp [UTC]: 2014-08-02 07:30:53 Age [y:d:h:m:s]: 10:102:23:03:39
Block: 155470 Fee (per_kB): 0.005332570000 (0.005060752252) Tx size: 1.0537 kB
Tx version: 1 No of confirmations: 3122683 RingCT/type: no
Extra: 022100910aa57c26222479e8175fd990b8115e0f20586731ba671be1994d3ce25cbe26014fc1a3a172bd1c8cc9a71533966e397d69d20c952a974e96206e96ba7863f37b

8 output(s) for total of 5.484667430000 xmr

stealth address amount amount idx tag
00: 4569512da1cf4fb693af9888c15785a5c2cdcfea455f933113d3f18c7c5d1202 0.000667430000 1 of 2 -
01: 5454593d51c09a38ab0f4f52024171cd43f3573c02e780c0a90a4013614df1fc 0.007000000000 168495 of 247340 -
02: d97c9542f49f72c7ee3a205574bf3a1bca6e981fe653f17089ccc675434ec422 0.007000000000 168496 of 247340 -
03: 40b4b3b6ef4c05a19a00b13169bebc4e66e8bb417539b304b45be0fcc2dd3dde 0.020000000000 207810 of 381491 -
04: 3e32d5f2a5dc6a17a316686b1eaca88d9a546e5a73cfa183badbf583f9898923 0.050000000000 112836 of 284521 -
05: f28932ec12fd69e029079bf6ceaac602ab6ff7ff4291137b96c5a024c6c5e658 0.100000000000 356310 of 982315 -
06: 8d8835d3cf16e6dbacfff66f4b295405971957fd88adbdfb2f7061a237a55295 0.300000000000 140144 of 976536 -
07: a0472c8ff8592a3323dd44f4896a167b96cd5b92bee6edbfb57dc3ee3b63b7e4 5.000000000000 84792 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-05 20:36:28 till 2014-08-02 08:18:18; resolution: 0.34 days)

  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |____________________________________________________________________________________________*____________________________________________________________________________*|
  • |________*________________________________________________________________________________________________________________________________________________________________*|
  • |_____________________________________________________________________________*___________________________________________________________________________________________*|

4 inputs(s) for total of 5.490000000000 xmr

key image 00: 2424a492ae18af7717a0600a54f56cfd10b76e9e73671a0ccd6ca7b1385adfc7 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: bf37cf21ef01c7ccbd8707c27500971407954be53c3668d80d307f7a802882fa 00072383 1 4/120 2014-06-05 21:36:28 10:160:08:58:04
- 01: 4c1e26c018ae57295c81e2735b52544ea59968f3d1267dd960424419550d7651 00155382 0 0/5 2014-08-02 06:18:05 10:103:00:16:27
key image 01: e231cb99c0e426171ae1244c4d1ec99dc551a7e71c1262bf24800fd9fba9b826 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ae9ea7050fb266d5d9c41bdef7025d3209a68f70590c5e036727e5f835c7becc 00117569 1 15/3 2014-07-07 00:39:06 10:129:05:55:26
- 01: 33b5f39b5190d4aa457ab6f8c3dab69f0fe539a5d99a2734dccdfc85e40374c5 00155396 0 0/5 2014-08-02 06:32:57 10:103:00:01:35
key image 02: 4630d590cb3f9d9537e2cc8924b1775204a6cf233793a365f805bf572e09d3ec amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 463c851065b5a36ef5b891316e13d4283c00a96ba358058f8a5817fdb2daa666 00076030 1 9/142 2014-06-08 10:07:24 10:157:20:27:08
- 01: 77360283654fe703a45a7e3180cbec5e3b7248944ef5968b01240ed45be88491 00155349 2 5/7 2014-08-02 05:54:23 10:103:00:40:09
key image 03: 1837756e7ffe6ac1e92ca7875b732797b01ec88031002b398febf7dabbe27983 amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9043c8c462601aab175cf972c5f5aff21bf209b4881fb4e83bc1afb25bc6dbda 00110208 0 0/6 2014-07-01 21:38:30 10:134:08:56:02
- 01: 07c77e6183b5653bd4327e9cf706c047e3856e91d8e4a718dcb4bef42b504f6a 00155453 2 4/7 2014-08-02 07:18:18 10:102:23:16:14
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 200000000000, "key_offsets": [ 21882, 283574 ], "k_image": "2424a492ae18af7717a0600a54f56cfd10b76e9e73671a0ccd6ca7b1385adfc7" } }, { "key": { "amount": 200000000000, "key_offsets": [ 151299, 154224 ], "k_image": "e231cb99c0e426171ae1244c4d1ec99dc551a7e71c1262bf24800fd9fba9b826" } }, { "key": { "amount": 90000000000, "key_offsets": [ 27413, 68056 ], "k_image": "4630d590cb3f9d9537e2cc8924b1775204a6cf233793a365f805bf572e09d3ec" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 29718, 55047 ], "k_image": "1837756e7ffe6ac1e92ca7875b732797b01ec88031002b398febf7dabbe27983" } } ], "vout": [ { "amount": 667430000, "target": { "key": "4569512da1cf4fb693af9888c15785a5c2cdcfea455f933113d3f18c7c5d1202" } }, { "amount": 7000000000, "target": { "key": "5454593d51c09a38ab0f4f52024171cd43f3573c02e780c0a90a4013614df1fc" } }, { "amount": 7000000000, "target": { "key": "d97c9542f49f72c7ee3a205574bf3a1bca6e981fe653f17089ccc675434ec422" } }, { "amount": 20000000000, "target": { "key": "40b4b3b6ef4c05a19a00b13169bebc4e66e8bb417539b304b45be0fcc2dd3dde" } }, { "amount": 50000000000, "target": { "key": "3e32d5f2a5dc6a17a316686b1eaca88d9a546e5a73cfa183badbf583f9898923" } }, { "amount": 100000000000, "target": { "key": "f28932ec12fd69e029079bf6ceaac602ab6ff7ff4291137b96c5a024c6c5e658" } }, { "amount": 300000000000, "target": { "key": "8d8835d3cf16e6dbacfff66f4b295405971957fd88adbdfb2f7061a237a55295" } }, { "amount": 5000000000000, "target": { "key": "a0472c8ff8592a3323dd44f4896a167b96cd5b92bee6edbfb57dc3ee3b63b7e4" } } ], "extra": [ 2, 33, 0, 145, 10, 165, 124, 38, 34, 36, 121, 232, 23, 95, 217, 144, 184, 17, 94, 15, 32, 88, 103, 49, 186, 103, 27, 225, 153, 77, 60, 226, 92, 190, 38, 1, 79, 193, 163, 161, 114, 189, 28, 140, 201, 167, 21, 51, 150, 110, 57, 125, 105, 210, 12, 149, 42, 151, 78, 150, 32, 110, 150, 186, 120, 99, 243, 123 ], "signatures": [ "add87a26925b12ee28de5324394e850db3de6f3f8621414f0c2922532f708400f0638af07ce09a34c11f5dac0be1543d5191717f273fe9441b33faed1c3b4a0059614ba76f8db3f7949081221fcdf5cbbf0d5180fd7f4b72b75f986d72c26b01e9991fafe509913377ac45042ff8d3ad0452411934a63da6caf90d73a78a2f03", "7ca410193a25cfd76ed176fa7c0d5f06b6fafa5beec00f17e7295fa2c75cc603684102f5844710b9858487c204be4e901bb63b1326b6351dcb734b3ec397320ae9ce9685b1e5effb3de8b6af03e1fdfdffebedfc3b4b9a9ad98be8db8f691e0220a2c71b051d4a4d56aacf0c315f1aa0e35e0a5d365901dd2857560f8db68209", "b72f9ddcbed8fbb71331d626ccf3343adc3457e8794fcf85dc816923965aa109ec3afdde03cb3b01f0b1d2056af698af970ebac0bfd470e1e18dd869327e210c7b2c9ce37ddcdcca7c6efa2993564e65574e72d09faeddf04d7cbab684efac039c8005e89199f2dd546dd1d101b19bfd6b7cf5a20d851fdd990cc02840f8650e", "2df2943a6e9808458d04d3479d2b5e3dac3601ad9b23282cb91b339bbd32b6020c89094df77d702cd7c9022f48355666e94312c18e6043aebad5320554c0b308e3bfe75f22edee63eec2206e31e8453831cccf1a12126a55915e1e78375fe80eb19c14a4df89654dffd40521118921b28d8b592615b541de8705cf972d150005"] }


Less details
source code | moneroexplorer