Monero Transaction 57f051fcfbaf45825c9d9ee304e1d155a0bbe084d8fba7ecb9a3f8de1fd39e8d

Autorefresh is OFF

Tx hash: 57f051fcfbaf45825c9d9ee304e1d155a0bbe084d8fba7ecb9a3f8de1fd39e8d

Tx prefix hash: c00b86a07dd293ad79585d30c9b5766303f4059e5d0079434339d4729c57f80c
Tx public key: b6a1ce6ec02f97d89dbe3104817266711ec3f9c3c0ce43cf28a87cece1c8128a
Payment id: c1c69f2b3d718e6268de802f8f3a96b9787aa4c87f2d327f53edc9e9978a088d

Transaction 57f051fcfbaf45825c9d9ee304e1d155a0bbe084d8fba7ecb9a3f8de1fd39e8d was carried out on the Monero network on 2014-08-04 02:23:35. The transaction has 3135745 confirmations. Total output fee is 0.005961770000 XMR.

Timestamp: 1407119015 Timestamp [UTC]: 2014-08-04 02:23:35 Age [y:d:h:m:s]: 10:122:20:31:02
Block: 158009 Fee (per_kB): 0.005961770000 (0.006129369960) Tx size: 0.9727 kB
Tx version: 1 No of confirmations: 3135745 RingCT/type: no
Extra: 022100c1c69f2b3d718e6268de802f8f3a96b9787aa4c87f2d327f53edc9e9978a088d01b6a1ce6ec02f97d89dbe3104817266711ec3f9c3c0ce43cf28a87cece1c8128a

6 output(s) for total of 4.114038230000 xmr

stealth address amount amount idx tag
00: 6370f2d7e40ef6df38857b0821e41a81f827d639e4aa9711eea38fd74fb2eee4 0.000038230000 0 of 2 -
01: 8a20371fb9c0c85b1775e37b79cb25e83ae36928589084dd1e192d9d6a855b51 0.007000000000 169411 of 247340 -
02: ab6ac2d3c63ef6b47d9cd4e4f38d454d5023a863f3ff00b448f30823e7ee82da 0.007000000000 169412 of 247340 -
03: b80862547d20bc95753f965db525acf528584bc391cc567f1d4b17afd3eb3e05 0.040000000000 129138 of 294095 -
04: 52eceb0ed1977a0caf12f0df490d50e0b34c96b74e2ed6dac45ad7a82c6e1fcc 0.060000000000 100081 of 264760 -
05: 3e82d29f772fa3d69ba05d5487c65c0be5b31b7945c0bac9eb164bae98d2f821 4.000000000000 32069 of 237197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-01 04:16:45 till 2014-08-04 01:52:10; resolution: 0.38 days)

  • |____________________________________*____________________________________________________________________________________________________________________________________*|
  • |_________________________________*_______________________________________________________________________________________________________________________________________*|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |____________________________________________*____________________________________________________________________________________________________________________________*|

4 inputs(s) for total of 4.120000000000 xmr

key image 00: dab3d458bc30b6195293eea299fbd7617f4cf567a43ab2c04139f3295df7bcef amount: 0.020000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: eeb67656d2c8b39c898064395b62852456ff957074c23d7c0d25589ccbcf2f10 00085269 1 1/25 2014-06-14 17:52:35 10:173:05:02:02
- 01: 129dbae1b9b26597b22e6112bc90488491a207ee7ff3b942a70717ae5af1fa89 00157832 0 0/5 2014-08-03 23:10:30 10:122:23:44:07
key image 01: d561817359814534b42fa17659dc9198cabf43c61b140a468a57cf5d5addf51f amount: 0.020000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a7666121f916ae3de2e82af836b99a6a69aea40730a56a237f35609a7d0dda22 00083518 1 15/134 2014-06-13 13:24:24 10:174:09:30:13
- 01: 7a6e80ffc452f9ad7fba22237b0fe18060e26f98d209b8ccdd3e81cf60cedce2 00157754 2 3/31 2014-08-03 21:34:43 10:123:01:19:54
key image 02: 5fe77231cf96cc2312caf0f35dfc41e35a29dd1eedc433876acfc8b2556dd192 amount: 0.080000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b5e0a7eb7f3df6597b47c86c87db06ff4ebb2d22759ed435150a8b981f51920c 00065696 1 83/180 2014-06-01 05:16:45 10:186:17:37:52
- 01: e0071a3ccd87810a0961ce1b975cbc4b019faa03aaee1ab3f103e2c1d8727b7c 00157919 2 2/7 2014-08-04 00:52:10 10:122:22:02:27
key image 03: 60c79b1e239870e39bd69a856ebf71fb8e6e87fbed35195e83a6150bb86e1c7f amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f05014d3001c99eed0c712cc66f26622f1b1e75ed9035eef0bf590b265cbf7c7 00089588 1 4/9 2014-06-17 18:32:17 10:170:04:22:20
- 01: 3053f5645bde36a1486d6de9c7d0d97c78e3dd7d41c0d3c7c4cb6dc7613d7112 00157841 2 5/70 2014-08-03 23:23:13 10:122:23:31:24
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 20000000000, "key_offsets": [ 135006, 73682 ], "k_image": "dab3d458bc30b6195293eea299fbd7617f4cf567a43ab2c04139f3295df7bcef" } }, { "key": { "amount": 20000000000, "key_offsets": [ 120380, 88292 ], "k_image": "d561817359814534b42fa17659dc9198cabf43c61b140a468a57cf5d5addf51f" } }, { "key": { "amount": 80000000000, "key_offsets": [ 16443, 70590 ], "k_image": "5fe77231cf96cc2312caf0f35dfc41e35a29dd1eedc433876acfc8b2556dd192" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 10029, 21992 ], "k_image": "60c79b1e239870e39bd69a856ebf71fb8e6e87fbed35195e83a6150bb86e1c7f" } } ], "vout": [ { "amount": 38230000, "target": { "key": "6370f2d7e40ef6df38857b0821e41a81f827d639e4aa9711eea38fd74fb2eee4" } }, { "amount": 7000000000, "target": { "key": "8a20371fb9c0c85b1775e37b79cb25e83ae36928589084dd1e192d9d6a855b51" } }, { "amount": 7000000000, "target": { "key": "ab6ac2d3c63ef6b47d9cd4e4f38d454d5023a863f3ff00b448f30823e7ee82da" } }, { "amount": 40000000000, "target": { "key": "b80862547d20bc95753f965db525acf528584bc391cc567f1d4b17afd3eb3e05" } }, { "amount": 60000000000, "target": { "key": "52eceb0ed1977a0caf12f0df490d50e0b34c96b74e2ed6dac45ad7a82c6e1fcc" } }, { "amount": 4000000000000, "target": { "key": "3e82d29f772fa3d69ba05d5487c65c0be5b31b7945c0bac9eb164bae98d2f821" } } ], "extra": [ 2, 33, 0, 193, 198, 159, 43, 61, 113, 142, 98, 104, 222, 128, 47, 143, 58, 150, 185, 120, 122, 164, 200, 127, 45, 50, 127, 83, 237, 201, 233, 151, 138, 8, 141, 1, 182, 161, 206, 110, 192, 47, 151, 216, 157, 190, 49, 4, 129, 114, 102, 113, 30, 195, 249, 195, 192, 206, 67, 207, 40, 168, 124, 236, 225, 200, 18, 138 ], "signatures": [ "dafbe14e574b27a1e68fd23d3a2ec3ce95dc22c3294af3be9453440b91d45500dfd7cb79238414319808355e22e8c60d369ed5bce533e8821a5c37695aa1e5012874d8a8b70472914e90a0de22fcf5d5e3c325427eeeae70ed67c86ab392e300497aac853d8f87f03658f8ed458c72af46cecb5f15da0535d4b1e7cb9e149905", "4fa831541ac1960be2c5ed364a5cbf40138bc43e21d2eedb901d9bdc4ade00034b426b3350fa78f0b20d197b7ef673eb9094860f697650c62cc608a74d0d3c0b82aeb01def51f6c381d195bfa93d0a12bcee6d8b2913e47a14a12b0b5cff930088ecaeb63f1faeb96f4f6b6580d5b3e2cd0299414dc7c7d52932408afe3f8e09", "74508857ba93c7ce23bb60d532140ef374f690eacb4654806f4728dc4ff3b40ff80e625b953ef79d15faf5f14cb0de2df094834ea8261b6d68ea3960c7c99f0fc2a6c850e99d9a28718faff27b3310eb63a83e0264a713d5725f3ba203adf2095334279aad631d5fb5346e5eafb547551efe78924481bacad6c4a1dcf31a1b04", "ed1112263b5e8bc352c4c2b1017adff0dbf37589ebeaee123eff0b54fb6b7303645841d42351cde5ed3519a6891083c026332b269cedf12d672ee49317305b0ff3f998924581852a8faf32b0fe5e0d958bcb0887390b2827e13d368a0a137802fde5ab58f8d1ae0bc064661249cd9cabd54821b34356550ce231dcbf26d58701"] }


Less details
source code | moneroexplorer