Monero Transaction 5493cd5b6f42f1aa61039d93ea55d446e4f456cd535fc69469437153f37a73ff

Autorefresh is OFF

Tx hash: 5493cd5b6f42f1aa61039d93ea55d446e4f456cd535fc69469437153f37a73ff

Tx public key: b255afe7b0ff4bf6f2727d78043959a1a329362f65f51b0070507b63aa4ce941
Payment id: 56a30366477d7312bdf0824b059c50cce305c07932d22bbeccb7738769452eb5

Transaction 5493cd5b6f42f1aa61039d93ea55d446e4f456cd535fc69469437153f37a73ff was carried out on the Monero network on 2014-09-06 22:37:08. The transaction has 3082378 confirmations. Total output fee is 0.152871103186 XMR.

Timestamp: 1410043028 Timestamp [UTC]: 2014-09-06 22:37:08 Age [y:d:h:m:s]: 10:082:09:24:01
Block: 206619 Fee (per_kB): 0.152871103186 (0.249665087181) Tx size: 0.6123 kB
Tx version: 1 No of confirmations: 3082378 RingCT/type: no
Extra: 02210056a30366477d7312bdf0824b059c50cce305c07932d22bbeccb7738769452eb501b255afe7b0ff4bf6f2727d78043959a1a329362f65f51b0070507b63aa4ce941

6 output(s) for total of 13.912404710000 xmr

stealth address amount amount idx tag
00: 32d7a7a1b4a7cec3f1294bf9bacf88fccb391f8e064d829d9de9ec0bdeebcbd1 0.012404710000 0 of 1 -
01: 936274e24214f2304ebefe71f07bc0a3eb00ce560342d9e25f5be570ca1e1c1d 0.200000000000 472881 of 1272210 -
02: aba8a8ead61fdd3f723aa8bfaa718203746893b8939f30c9be71765f6022fee9 0.700000000000 140928 of 514467 -
03: 57d55cb6bc4b4248b8c9fb8db653236b3f31e5983c5554a4b6b1629023514a96 1.000000000000 243137 of 874629 -
04: 5e3d7f5775c926aa368d07c0dc8849a878df20c10099dca03deef9a20b6d35d0 2.000000000000 93959 of 434057 -
05: 90acb62af737ed6ea6c81fc3e811114922e30a991940ab4f4baeff221871360e 10.000000000000 239402 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



3 inputs(s) for total of 14.065275813186 xmr

key image 00: efcaf7c6c40fbbfc7e1afd1cf2f59d6c49e9a84155fc2070d946ea741422f878 amount: 0.065275813186
ring members blk
- 00: fccecd343116fdb0adfd42154b1e07f28dbb6c6e5f7180e2b4e03657ecc3999f 00193249
key image 01: 1c759c494cc2888ca1f3a732ce0f7cfcab39451adc75e632a85066a5e2ead42c amount: 10.000000000000
ring members blk
- 00: d7cdbf959f1ad05407e6fb3004004abce0edeb053dd33cbb14de9be77a4f11a2 00206451
key image 02: aa8c1b698c6b1324d1cdbb0fefc22b5b0172e2374690bdc22d13303ea48433e3 amount: 4.000000000000
ring members blk
- 00: 4f401a1264e901a0dcb50c19a7e1faab3aa7b27055bf481a62b489bcb22e18d9 00205959
More details
source code | moneroexplorer