Monero Transaction 55493be6968f1fb46c27b8ff8f6393ac07155a5c7299abebe518945290726426

Autorefresh is OFF

Tx hash: 55493be6968f1fb46c27b8ff8f6393ac07155a5c7299abebe518945290726426

Tx prefix hash: 3ff85b0cb5c2b97f19a7c8b9bc121a8b464abd00d0897f3143225a7d644b40ae
Tx public key: 3a6c41c4232a8976becb7da0a17c0ec8321ef7a8d5a1a867f8bab0d381d69f06
Payment id: 829a3eeb7ec84a4d85d0e432cbf602f7eb13cd13dc164e6e90f8178854955fc3

Transaction 55493be6968f1fb46c27b8ff8f6393ac07155a5c7299abebe518945290726426 was carried out on the Monero network on 2014-06-25 21:07:08. The transaction has 3206812 confirmations. Total output fee is 0.005383690124 XMR.

Timestamp: 1403730428 Timestamp [UTC]: 2014-06-25 21:07:08 Age [y:d:h:m:s]: 10:182:07:41:24
Block: 101471 Fee (per_kB): 0.005383690124 (0.011630587947) Tx size: 0.4629 kB
Tx version: 1 No of confirmations: 3206812 RingCT/type: no
Extra: 022100829a3eeb7ec84a4d85d0e432cbf602f7eb13cd13dc164e6e90f8178854955fc3013a6c41c4232a8976becb7da0a17c0ec8321ef7a8d5a1a867f8bab0d381d69f06

5 output(s) for total of 0.074830897488 xmr

stealth address amount amount idx tag
00: 6494b38cafbf24bfa975c49f3b905006ef501b4cbb0832ce013dcd3bb41b816f 0.000830897488 10 of 14 -
01: 460a42bb541207a9172dfb7dabcc76db9cb376ac7ea3cfb02351db4e4c62e4f7 0.005000000000 177237 of 308585 -
02: 1bee65c981bef61d06ac1b200e75b50bc3971e77aa2000397d3c41bcb79dac9a 0.009000000000 144375 of 233398 -
03: 299feec6911501299356aecc5d149f10f480a0a5b6e3fca2966ce76dc0ea3462 0.020000000000 193306 of 381492 -
04: b2b09e7107f0e6f26d74ae6f856134d04fca72ca58e08f29db0e0ae974ae4ec7 0.040000000000 114678 of 294095 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-15 10:29:54 till 2014-06-17 19:17:22; resolution: 0.01 days)

  • |___*______________________________________________________________________________________________________________________________________________________________________|
  • |_______________________________________________________________________________________________________________________________________________________________________*__|

2 inputs(s) for total of 0.080214587612 xmr

key image 00: 893f1b406055a5424baea1f686eb954936c3440840366d6a784ed1e394a3d0b6 amount: 0.000214587612
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f234f2aa7c4a9d2fc07d996fefc3bd243652968323a0845a95ebb669e7e808be 00086343 1 1/89 2014-06-15 11:29:54 10:192:17:18:38
key image 01: 789722c0b7cad91800e881464fca41f7469a6c3bc642a6242225f6be6bef2d6e amount: 0.080000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 886d8d0bfddd66c63da3330be0887b536181b5d212f757826a958d0fafd1e942 00089572 1 2/103 2014-06-17 18:17:22 10:190:10:31:10
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 214587612, "key_offsets": [ 0 ], "k_image": "893f1b406055a5424baea1f686eb954936c3440840366d6a784ed1e394a3d0b6" } }, { "key": { "amount": 80000000000, "key_offsets": [ 57517 ], "k_image": "789722c0b7cad91800e881464fca41f7469a6c3bc642a6242225f6be6bef2d6e" } } ], "vout": [ { "amount": 830897488, "target": { "key": "6494b38cafbf24bfa975c49f3b905006ef501b4cbb0832ce013dcd3bb41b816f" } }, { "amount": 5000000000, "target": { "key": "460a42bb541207a9172dfb7dabcc76db9cb376ac7ea3cfb02351db4e4c62e4f7" } }, { "amount": 9000000000, "target": { "key": "1bee65c981bef61d06ac1b200e75b50bc3971e77aa2000397d3c41bcb79dac9a" } }, { "amount": 20000000000, "target": { "key": "299feec6911501299356aecc5d149f10f480a0a5b6e3fca2966ce76dc0ea3462" } }, { "amount": 40000000000, "target": { "key": "b2b09e7107f0e6f26d74ae6f856134d04fca72ca58e08f29db0e0ae974ae4ec7" } } ], "extra": [ 2, 33, 0, 130, 154, 62, 235, 126, 200, 74, 77, 133, 208, 228, 50, 203, 246, 2, 247, 235, 19, 205, 19, 220, 22, 78, 110, 144, 248, 23, 136, 84, 149, 95, 195, 1, 58, 108, 65, 196, 35, 42, 137, 118, 190, 203, 125, 160, 161, 124, 14, 200, 50, 30, 247, 168, 213, 161, 168, 103, 248, 186, 176, 211, 129, 214, 159, 6 ], "signatures": [ "aa9ed111b2da51d7d16afe09e244b7ce4041bb2c8ec2f3fd67b3640ec4f8810b4354303bf80f2b84379e906b072a5925ad4dfc337cf77f978f05664f45410607", "306f4a7f4a7333fbc496907b89b458c815930cb461f32c92b4d183b2d7b876022dd75c3646ab83a702bc406e8410cbdbb9a232f1a9d550f908156ae58a1b1703"] }


Less details
source code | moneroexplorer