Monero Transaction 54fd1fe62654f285de462edc00beb14f6059efeb158be1c174f34e1ebd866fb2

Autorefresh is OFF

Tx hash: 54fd1fe62654f285de462edc00beb14f6059efeb158be1c174f34e1ebd866fb2

Tx prefix hash: 1e86cec63a6ba2efc563b943225a0e150599f5bc103b3e8eb8099071455fc91a
Tx public key: 42e27d2933effc585813bafc3bab77d7d1d2d68aade15a28219f41b80854e935
Payment id: 3a97e489a7226467660ed7d94e88cfe454fe803deae7ddca16b7cdb7fbe763f2

Transaction 54fd1fe62654f285de462edc00beb14f6059efeb158be1c174f34e1ebd866fb2 was carried out on the Monero network on 2014-12-19 13:18:36. The transaction has 2939125 confirmations. Total output fee is 0.020000000000 XMR.

Timestamp: 1418995116 Timestamp [UTC]: 2014-12-19 13:18:36 Age [y:d:h:m:s]: 09:350:07:28:47
Block: 354584 Fee (per_kB): 0.020000000000 (0.042226804124) Tx size: 0.4736 kB
Tx version: 1 No of confirmations: 2939125 RingCT/type: no
Extra: 0221003a97e489a7226467660ed7d94e88cfe454fe803deae7ddca16b7cdb7fbe763f20142e27d2933effc585813bafc3bab77d7d1d2d68aade15a28219f41b80854e935

5 output(s) for total of 11.980000000000 xmr

stealth address amount amount idx tag
00: df0d5474b0323425337919c026cbc0dc9f264dcc47ff984fb708f9526d72fd63 0.080000000000 106803 of 269576 -
01: 7da1a0b848090ddaf46867554a5d86422cd9fbab74caf549be3400a6101c3aba 0.100000000000 677143 of 982315 -
02: c3608739e0e6e93d2a20db44159a9501d5b0f43ec77d49c0c9d0bd9702fc85a7 0.800000000000 223196 of 489955 -
03: 3829bcf0604bfd35b6ac11ab4970de75f87b8ea2e9124f4bbaa50ed79d852c1a 5.000000000000 133992 of 255089 -
04: 568faf7c5eada1e1babdf59ee46ce74faa7a087aa3024e8ed528ac67fbb47fe3 6.000000000000 93006 of 207703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-12-19 09:29:01 till 2014-12-19 13:14:15; resolution: 0.00 days)

  • |____________________________________________________________________________________________________________________________*_____________________________________________|
  • |______________________________________________*___________________________________________________________________________________________________________________________|

2 inputs(s) for total of 12.000000000000 xmr

key image 00: 2f6244a57c0e81a36acf0efb9872a2a3d4db24af491728fec68489316690d869 amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 724078f3943488350d6cb800734add7544442c31a7c3983d2951a5b0bb70d82d 00354500 0 0/4 2014-12-19 12:14:15 09:350:08:33:08
key image 01: e5de47445640897564684583adfd94d32dd164500fcf92e88a26c0c474a79a69 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: cae4283761ebed6f8afaab034e99eff5127de1776b071bd91b4631cfaea657b7 00354338 0 0/4 2014-12-19 10:29:01 09:350:10:18:22
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 2000000000000, "key_offsets": [ 175106 ], "k_image": "2f6244a57c0e81a36acf0efb9872a2a3d4db24af491728fec68489316690d869" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 410381 ], "k_image": "e5de47445640897564684583adfd94d32dd164500fcf92e88a26c0c474a79a69" } } ], "vout": [ { "amount": 80000000000, "target": { "key": "df0d5474b0323425337919c026cbc0dc9f264dcc47ff984fb708f9526d72fd63" } }, { "amount": 100000000000, "target": { "key": "7da1a0b848090ddaf46867554a5d86422cd9fbab74caf549be3400a6101c3aba" } }, { "amount": 800000000000, "target": { "key": "c3608739e0e6e93d2a20db44159a9501d5b0f43ec77d49c0c9d0bd9702fc85a7" } }, { "amount": 5000000000000, "target": { "key": "3829bcf0604bfd35b6ac11ab4970de75f87b8ea2e9124f4bbaa50ed79d852c1a" } }, { "amount": 6000000000000, "target": { "key": "568faf7c5eada1e1babdf59ee46ce74faa7a087aa3024e8ed528ac67fbb47fe3" } } ], "extra": [ 2, 33, 0, 58, 151, 228, 137, 167, 34, 100, 103, 102, 14, 215, 217, 78, 136, 207, 228, 84, 254, 128, 61, 234, 231, 221, 202, 22, 183, 205, 183, 251, 231, 99, 242, 1, 66, 226, 125, 41, 51, 239, 252, 88, 88, 19, 186, 252, 59, 171, 119, 215, 209, 210, 214, 138, 173, 225, 90, 40, 33, 159, 65, 184, 8, 84, 233, 53 ], "signatures": [ "a30f0dd411b149e4ef148e902bc9a2134f07ee5f3dec61e5deedef88bd4db506aad7f4d0e2c466f17dd3fc808cdac76cbed4604cb69282a8375345c977e73003", "b5bb2b3179e7f2bfc8125e2558abed27bcd8453df8821923eb4ed351b94434031cfbccad05698b41fd64513f4fe34b381f0486955a3f720c4de5178d708d8f01"] }


Less details
source code | moneroexplorer