Monero Transaction 57c088b668894ac5fcd6233790c53caa4dfea6f50dd81ecd4d9971e8be844dc1

Autorefresh is OFF

Tx hash: 57c088b668894ac5fcd6233790c53caa4dfea6f50dd81ecd4d9971e8be844dc1

Tx prefix hash: 81bd83aeb88c146969814e713b8f421600668ec215a6a18d186a03303a9e85a9
Tx public key: ea6593667151cbfcae3b8b35965e8c03a4be30807158b7932c22a58072eb1db5
Payment id: 55692fcbeacf4ec6edcd624e140a44b038c8eb0d9f7a4fc194eafb1a38eb026f

Transaction 57c088b668894ac5fcd6233790c53caa4dfea6f50dd81ecd4d9971e8be844dc1 was carried out on the Monero network on 2014-07-04 02:44:20. The transaction has 3165005 confirmations. Total output fee is 0.005368149309 XMR.

Timestamp: 1404441860 Timestamp [UTC]: 2014-07-04 02:44:20 Age [y:d:h:m:s]: 10:132:11:37:03
Block: 113380 Fee (per_kB): 0.005368149309 (0.006067312243) Tx size: 0.8848 kB
Tx version: 1 No of confirmations: 3165005 RingCT/type: no
Extra: 02210055692fcbeacf4ec6edcd624e140a44b038c8eb0d9f7a4fc194eafb1a38eb026f01ea6593667151cbfcae3b8b35965e8c03a4be30807158b7932c22a58072eb1db5

5 output(s) for total of 2.695000000000 xmr

stealth address amount amount idx tag
00: 405ba7596369beceaf9aff47cc6cdfc73d97d3331b63016eaf46d5fc7cdd239c 0.005000000000 182451 of 308584 -
01: 1227c9feab3b95ea08dd66a5e78e9979062f365c3e14f11357905c1b5671cdd5 0.090000000000 73466 of 317822 -
02: b91e63449756034a7a413905cd1c57688166cb2916d462c797e49171cf715ee5 0.100000000000 225321 of 982315 -
03: 5fce38fd626acb9667966e00d5c15ed9563018026050582c7531f58edd35be6d 0.500000000000 88002 of 1118624 -
04: d8c66f6c0b816e2a4542264f6b2bdbce8f697aabf24af848cd2b237db78a67db 2.000000000000 30310 of 434057 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-22 18:16:42 till 2014-07-04 02:53:19; resolution: 0.07 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |______________________________________________________________________________________________________________________________________________________________*___________|
  • |__________________________________________________________________________________________________________________________________________________________*_______________|
  • |__________________________________________________________________________________________________________________________________________________________________*_______|
  • |_____________________________________________________________________________________________________________________________________________________________________*____|
  • |_________________________________________________________________________________________________________________________________________________________________________*|

6 inputs(s) for total of 2.700368149309 xmr

key image 00: 8d6839fe8315831e7ad78473d8c3b73076c822e93eb47461628410a90fdb5e93 amount: 0.000368149309
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e22ffc07a0f5fe0825b295c57dce018127268fb8f94f471e3ce41744e03deef9 00097077 1 3/110 2014-06-22 19:16:42 10:143:19:04:41
key image 01: e25405a15ce7e07b5905f369a723c96872fccf6b65c6cf08ee30afdd45b6d6f8 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ccf630c5eb85f915db9e8bfb09e5ffc66086c507b59846475bc1dd8b1a96c116 00112235 1 9/15 2014-07-03 07:53:23 10:133:06:28:00
key image 02: 0ef323a33fb5eefe8e7d9b109fcd93b5d573aa991c4d87f2a1a643aa05d3a287 amount: 0.700000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f8f9a1e3fb934bb5904ea16acb79f98c65af63f1cb5ad776558a312acfa81e0e 00111892 1 7/30 2014-07-03 02:23:18 10:133:11:58:05
key image 03: 87cf3a5c997e8f7a2cb083395dbb93fb069c0a4b4c4733882f97c877b9bf31cc amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a5f14b408a79eff2117fceb26bfd64ec5ba4d80c2f51486a51512242e238ea65 00112665 1 7/27 2014-07-03 14:53:24 10:132:23:27:59
key image 04: f2540733d64ea71476cf99ca8acdb6791d2ce614b44273e5c6639915de7363fb amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 959dd8ebf099aaa1de4067551eb7c3a3ea8b1b5bcf638d6548e45d426d764ba3 00112918 1 3/20 2014-07-03 18:56:04 10:132:19:25:19
key image 05: b7cd870224858ae3d4dfe7be2672e8e9f2286496a71af96e3627c13abdbe54e1 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1d45f9a4b98a6f9da0d7e38073ea7df0d40aa1a7293daf7deaf47ae893e985b4 00113327 1 11/22 2014-07-04 01:53:19 10:132:12:28:04
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 368149309, "key_offsets": [ 0 ], "k_image": "8d6839fe8315831e7ad78473d8c3b73076c822e93eb47461628410a90fdb5e93" } }, { "key": { "amount": 500000000000, "key_offsets": [ 86207 ], "k_image": "e25405a15ce7e07b5905f369a723c96872fccf6b65c6cf08ee30afdd45b6d6f8" } }, { "key": { "amount": 700000000000, "key_offsets": [ 42918 ], "k_image": "0ef323a33fb5eefe8e7d9b109fcd93b5d573aa991c4d87f2a1a643aa05d3a287" } }, { "key": { "amount": 500000000000, "key_offsets": [ 87241 ], "k_image": "87cf3a5c997e8f7a2cb083395dbb93fb069c0a4b4c4733882f97c877b9bf31cc" } }, { "key": { "amount": 500000000000, "key_offsets": [ 87652 ], "k_image": "f2540733d64ea71476cf99ca8acdb6791d2ce614b44273e5c6639915de7363fb" } }, { "key": { "amount": 500000000000, "key_offsets": [ 87926 ], "k_image": "b7cd870224858ae3d4dfe7be2672e8e9f2286496a71af96e3627c13abdbe54e1" } } ], "vout": [ { "amount": 5000000000, "target": { "key": "405ba7596369beceaf9aff47cc6cdfc73d97d3331b63016eaf46d5fc7cdd239c" } }, { "amount": 90000000000, "target": { "key": "1227c9feab3b95ea08dd66a5e78e9979062f365c3e14f11357905c1b5671cdd5" } }, { "amount": 100000000000, "target": { "key": "b91e63449756034a7a413905cd1c57688166cb2916d462c797e49171cf715ee5" } }, { "amount": 500000000000, "target": { "key": "5fce38fd626acb9667966e00d5c15ed9563018026050582c7531f58edd35be6d" } }, { "amount": 2000000000000, "target": { "key": "d8c66f6c0b816e2a4542264f6b2bdbce8f697aabf24af848cd2b237db78a67db" } } ], "extra": [ 2, 33, 0, 85, 105, 47, 203, 234, 207, 78, 198, 237, 205, 98, 78, 20, 10, 68, 176, 56, 200, 235, 13, 159, 122, 79, 193, 148, 234, 251, 26, 56, 235, 2, 111, 1, 234, 101, 147, 102, 113, 81, 203, 252, 174, 59, 139, 53, 150, 94, 140, 3, 164, 190, 48, 128, 113, 88, 183, 147, 44, 34, 165, 128, 114, 235, 29, 181 ], "signatures": [ "34a751943e7ec04cb9500a107f9229954fb87df3dbfd14dce05f43c7a8161b09136f3a46ee0392e4600fa9971f242e08095a55939653b0889fd511ef2c63d001", "f8680a3d67ac5293375141dc29dfff7976de8392757da1bf5962186069419307fc2077f0dffa004007a635147ece27162d1638267052f9d0147a44a3452d810f", "a47e92d795f4798bb5bf3622a0a11496036f770559aa63bb3b1da68a7aa4a60c6ba751958ff987b144fb2151037eb6f6ae9e9242481f3b1f21097c51b02b0b07", "c3eb430784f8d4e4fb7fa2e77f9d12fb286be33cb975d8700ab96528a8b5180fab1c09f0c5c989fcae74fcfd68fc929136af9a2bacb2cc19f23fb7ac699b5101", "2d218941f9b0d813223437fbee02cc8d3059f87a28610bbbd0687ae1e1bba50ab328b4591b7131ff5dd6f703e05fd5eee4d4a00405ef65f0546cdb68db7d4600", "46988c856be7b4b41a227b52725d4785696c7faa53667f654f0391be8ae6e406db9809362b8c5c1ac60e9e76b2e2e4def2c138613befa1dacc0e0bf433c7ee02"] }


Less details
source code | moneroexplorer