Monero Transaction 55f141a98ef94c36f6b69fbf31802e1d8362db0a0709942fc5048362ac5b594b

Autorefresh is OFF

Tx hash: 55f141a98ef94c36f6b69fbf31802e1d8362db0a0709942fc5048362ac5b594b

Tx prefix hash: 97230dd43614efe1f5c755e4242ffa57790ddb0d4d8deda0425420bbec59c1c9
Tx public key: 6039623588aac1b2e07f48e64f5b323bc4d18dc94b88fd726ba979a02852ebfa
Payment id: 095e9433f48c0f4f529ab879d1943873d05758fa0355a401cf11b6427ade91a7

Transaction 55f141a98ef94c36f6b69fbf31802e1d8362db0a0709942fc5048362ac5b594b was carried out on the Monero network on 2014-06-24 03:21:34. The transaction has 3179465 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1403580094 Timestamp [UTC]: 2014-06-24 03:21:34 Age [y:d:h:m:s]: 10:142:13:11:52
Block: 98985 Fee (per_kB): 0.005000000000 (0.015753846154) Tx size: 0.3174 kB
Tx version: 1 No of confirmations: 3179465 RingCT/type: no
Extra: 022100095e9433f48c0f4f529ab879d1943873d05758fa0355a401cf11b6427ade91a7016039623588aac1b2e07f48e64f5b323bc4d18dc94b88fd726ba979a02852ebfa

1 output(s) for total of 1.000000000000 xmr

stealth address amount amount idx tag
00: e859c3cb6d13fb552afcad278f40025400d0f8fd1aab2098f8b7e0498dbf8405 1.000000000000 42547 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-17 01:31:16 till 2014-06-24 03:39:52; resolution: 0.04 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 1.005000000000 xmr

key image 00: 94da85e325e68db3d3024043b6373a1726ad482e1fe6c0fa223215d359eef745 amount: 0.005000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6a3254bb26082f9f263a3811782b9edf0931a821178aa713203ddfd0f1cbd263 00088689 1 9/112 2014-06-17 02:31:16 10:149:14:02:10
key image 01: dad165a75772ea5eafb36d27469590e9809481f1358efed7d361f3c86801f743 amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1d771197f80658974aef1a5b029674dafb036f817eb3a1dc5dad9be16deea80a 00098951 1 8/58 2014-06-24 02:39:52 10:142:13:53:34
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000, "key_offsets": [ 146882 ], "k_image": "94da85e325e68db3d3024043b6373a1726ad482e1fe6c0fa223215d359eef745" } }, { "key": { "amount": 1000000000000, "key_offsets": [ 42497 ], "k_image": "dad165a75772ea5eafb36d27469590e9809481f1358efed7d361f3c86801f743" } } ], "vout": [ { "amount": 1000000000000, "target": { "key": "e859c3cb6d13fb552afcad278f40025400d0f8fd1aab2098f8b7e0498dbf8405" } } ], "extra": [ 2, 33, 0, 9, 94, 148, 51, 244, 140, 15, 79, 82, 154, 184, 121, 209, 148, 56, 115, 208, 87, 88, 250, 3, 85, 164, 1, 207, 17, 182, 66, 122, 222, 145, 167, 1, 96, 57, 98, 53, 136, 170, 193, 178, 224, 127, 72, 230, 79, 91, 50, 59, 196, 209, 141, 201, 75, 136, 253, 114, 107, 169, 121, 160, 40, 82, 235, 250 ], "signatures": [ "e01e12e86813b0fd67bd7c824b09c0ff7e2919f9536c7eccdad9addcc2a4c400bafe5175f4ebee705586c83d2881fd99ef87497e8b3d0f2197f6d55d840b8a05", "5bc1e49d8e425b4d13282cddbac7a274f1ac5cf4055b5fcd9e16f0669446320ce754167cebd59743148af837b6abe3938cc737f3bf33f19bd605da150e1be206"] }


Less details
source code | moneroexplorer