Monero Transaction 557aacb4820c9ad8b39ccc6c4a83fce08914a075d4d34c4c29485203921ebbc7

Autorefresh is OFF

Tx hash: 557aacb4820c9ad8b39ccc6c4a83fce08914a075d4d34c4c29485203921ebbc7

Tx prefix hash: 5ca2b97bff6536317ad2c469712501ed25c06ebdfe7e344daed49b4b1ddd70a1
Tx public key: ef4ee3fa88f05eb4d758c482086e55b8fd77e204ea6f349631279f847be2341e
Payment id: 41295e42ea42febbaeafa7518b94df062b90f7aef1c2627c014f49df8748fa22

Transaction 557aacb4820c9ad8b39ccc6c4a83fce08914a075d4d34c4c29485203921ebbc7 was carried out on the Monero network on 2014-09-03 17:17:46. The transaction has 3088347 confirmations. Total output fee is 0.141500880000 XMR.

Timestamp: 1409764666 Timestamp [UTC]: 2014-09-03 17:17:46 Age [y:d:h:m:s]: 10:087:14:55:05
Block: 202025 Fee (per_kB): 0.141500880000 (0.220208056413) Tx size: 0.6426 kB
Tx version: 1 No of confirmations: 3088347 RingCT/type: no
Extra: 02210041295e42ea42febbaeafa7518b94df062b90f7aef1c2627c014f49df8748fa2201ef4ee3fa88f05eb4d758c482086e55b8fd77e204ea6f349631279f847be2341e

4 output(s) for total of 14.363499120000 xmr

stealth address amount amount idx tag
00: e748d4bd63a3649b0952116261b78cd6729c6265d40d7d1e0d78dd91a1be78cf 0.063499120000 0 of 1 -
01: af3329b470621b4e69bdeb2d8adb2861d9b3d9c0e6dfad6f0a408c1acce13076 0.300000000000 201738 of 976536 -
02: dff75af8372409ea5bb7411158a3e9d3171016a202ff7a08f5e526ac720560ba 4.000000000000 73943 of 237197 -
03: fc105b41a719b5cbbd0831a6979c888ede27b7e12a4e39431518cea243e10432 10.000000000000 234050 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-08-08 06:14:47 till 2014-09-03 11:09:01; resolution: 0.15 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |________________________________________________________________________________________________________________________________________________________________________*_|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_______________________________________________________________________________________________________________________________________________________________________*__|

4 inputs(s) for total of 14.505000000000 xmr

key image 00: 3bc1caadd0d2d7dc1025052397b9f3ab634aad94b7877978e3b77edbc5b08f39 amount: 0.005000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f175393a3308527f2fd8dbe200e08475ff03dbe75cca0505738477b5f876bf5d 00164040 2 5/53 2014-08-08 07:14:47 10:114:00:58:04
key image 01: badbab6921edfda4f790af5a3160dc060a4c903b6dab663e8c9fc7f0ddc10ead amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ae8588de633748f9bd0431170ef337037424bab1e782d7df0413905d1a9ec69a 00201267 0 0/4 2014-09-03 05:29:06 10:088:02:43:45
key image 02: ff49074ac9bb888bcb67889920548ae8057dd3e6bfa52e4dcdc9c4c5cbec8ca3 amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 690f0b3e2a1b01c7b827c0a76903e70c9543c198a95884ffa7691867615fbae4 00201573 1 7/93 2014-09-03 10:09:01 10:087:22:03:50
key image 03: 41987365505d925e79401db54bf7b446e839103e2502c17b36f27075c3939e9b amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0a0bd4c7590e64678806e45aac4f7a715638d6b70606d60d6f47b2f862d1be54 00200964 0 0/4 2014-09-03 00:36:54 10:088:07:35:57
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000, "key_offsets": [ 205429 ], "k_image": "3bc1caadd0d2d7dc1025052397b9f3ab634aad94b7877978e3b77edbc5b08f39" } }, { "key": { "amount": 500000000000, "key_offsets": [ 279906 ], "k_image": "badbab6921edfda4f790af5a3160dc060a4c903b6dab663e8c9fc7f0ddc10ead" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 73366 ], "k_image": "ff49074ac9bb888bcb67889920548ae8057dd3e6bfa52e4dcdc9c4c5cbec8ca3" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 232766 ], "k_image": "41987365505d925e79401db54bf7b446e839103e2502c17b36f27075c3939e9b" } } ], "vout": [ { "amount": 63499120000, "target": { "key": "e748d4bd63a3649b0952116261b78cd6729c6265d40d7d1e0d78dd91a1be78cf" } }, { "amount": 300000000000, "target": { "key": "af3329b470621b4e69bdeb2d8adb2861d9b3d9c0e6dfad6f0a408c1acce13076" } }, { "amount": 4000000000000, "target": { "key": "dff75af8372409ea5bb7411158a3e9d3171016a202ff7a08f5e526ac720560ba" } }, { "amount": 10000000000000, "target": { "key": "fc105b41a719b5cbbd0831a6979c888ede27b7e12a4e39431518cea243e10432" } } ], "extra": [ 2, 33, 0, 65, 41, 94, 66, 234, 66, 254, 187, 174, 175, 167, 81, 139, 148, 223, 6, 43, 144, 247, 174, 241, 194, 98, 124, 1, 79, 73, 223, 135, 72, 250, 34, 1, 239, 78, 227, 250, 136, 240, 94, 180, 215, 88, 196, 130, 8, 110, 85, 184, 253, 119, 226, 4, 234, 111, 52, 150, 49, 39, 159, 132, 123, 226, 52, 30 ], "signatures": [ "4b2862eaff6065e1b36b798468362c2f7ba69fe5a965133d709b61ba5a3e5d0e107e8a4ff862bcca56a0d5d726ba35427dd1be24cbe454e27cf4faefab8a3804", "cbdedf3d4c6db45ec3726d51981c6ba3b504009cd4594075889a16daf08b8806deb6644c58dcd4fa3acb5788243ea8267c8afbf3ad8a7ed25b99d85e6414d006", "eb45033de15abc74c9310ea1e098bafa281e0b7394a76aa3e2b475115c099d0a08fe4c30d3827ece7ab34463e530f21261335ba63125db2aef82ce5c0005250a", "897b07dace13b96129f5d636ca877498d0ad85d518610cd8b746b018d8d63f026f0c0b3e3d7d9fedffd4b752237e07f9ab5a787dd2bd770305e74301d8d8c30e"] }


Less details
source code | moneroexplorer