Monero Transaction 54d1ff4ddf2c8ae7de5077bfe0a0a5332f149b90264fcdd2cdd9144befde7990

Autorefresh is OFF

Tx hash: 54d1ff4ddf2c8ae7de5077bfe0a0a5332f149b90264fcdd2cdd9144befde7990

Tx prefix hash: 8b9c70775b1aa45e9240e1af5952aa0ed9502f4ce7f2d832aa637c186a3ebca6
Tx public key: 2fb9ee555ecd8e2a5a5e62d32a039cc94486ce3c4f296daea791a72bfeafb3de
Payment id: 4e02dc499498429d9ec3e93c6ef66e0c79d1ff8687fd4220bef8bf1c65e4eab2

Transaction 54d1ff4ddf2c8ae7de5077bfe0a0a5332f149b90264fcdd2cdd9144befde7990 was carried out on the Monero network on 2014-07-02 10:55:13. The transaction has 3167356 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1404298513 Timestamp [UTC]: 2014-07-02 10:55:13 Age [y:d:h:m:s]: 10:134:01:57:12
Block: 110985 Fee (per_kB): 0.010000000000 (0.031507692308) Tx size: 0.3174 kB
Tx version: 1 No of confirmations: 3167356 RingCT/type: no
Extra: 0221004e02dc499498429d9ec3e93c6ef66e0c79d1ff8687fd4220bef8bf1c65e4eab2012fb9ee555ecd8e2a5a5e62d32a039cc94486ce3c4f296daea791a72bfeafb3de

1 output(s) for total of 0.300000000000 xmr

stealth address amount amount idx tag
00: f3657b0c0f46bc73da64ecae0ac9faf5d1a7562fc4e43a7d7a95bd9bfd63076b 0.300000000000 79622 of 976536 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-29 01:16:53 till 2014-07-02 11:29:52; resolution: 0.02 days)

  • |___*______________________________________________________________________________________________________________________________________________________________________|
  • |_______________________________________________________________________________________________________________________________________________________________________*__|

2 inputs(s) for total of 0.310000000000 xmr

key image 00: 8a1220d2c0380f682659160346990552da3a2740ffbcb0ca2f404de60b9aab6f amount: 0.010000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6d326144bf31ef382764d9d0aefc220fb885bedb7c0e6137463ec72e8d573d2e 00106089 1 2/2 2014-06-29 02:16:53 10:137:10:35:32
key image 01: 9379bd04df7f6f2e0fcad631e47c9f0361b47b40f37ff7abc07a11f0908c3e70 amount: 0.300000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 96575d840c7ef844295ce588084037bff1590807ec081838677c25d1e2b3b486 00110967 1 2/2 2014-07-02 10:29:52 10:134:02:22:33
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 10000000000, "key_offsets": [ 308394 ], "k_image": "8a1220d2c0380f682659160346990552da3a2740ffbcb0ca2f404de60b9aab6f" } }, { "key": { "amount": 300000000000, "key_offsets": [ 79604 ], "k_image": "9379bd04df7f6f2e0fcad631e47c9f0361b47b40f37ff7abc07a11f0908c3e70" } } ], "vout": [ { "amount": 300000000000, "target": { "key": "f3657b0c0f46bc73da64ecae0ac9faf5d1a7562fc4e43a7d7a95bd9bfd63076b" } } ], "extra": [ 2, 33, 0, 78, 2, 220, 73, 148, 152, 66, 157, 158, 195, 233, 60, 110, 246, 110, 12, 121, 209, 255, 134, 135, 253, 66, 32, 190, 248, 191, 28, 101, 228, 234, 178, 1, 47, 185, 238, 85, 94, 205, 142, 42, 90, 94, 98, 211, 42, 3, 156, 201, 68, 134, 206, 60, 79, 41, 109, 174, 167, 145, 167, 43, 254, 175, 179, 222 ], "signatures": [ "51adcb82881230474f4b1f5e83cd6bc244a14d4207382f906b3caea726d8ff01bea55e9411d33e0eaf69199d0907d79211693e6b0af8fa330691943e39243c07", "88970ee645e3e7d141b790fd07aada5f14fd808fb62d74fe5269d01b72bf4600e5578646f5228bcdbac6b8eb7baad3104c23f149247946a474886b56331b660c"] }


Less details
source code | moneroexplorer