Monero Transaction 5928c5ec9f7cbd579f5b5d57544005aead83674071666daa22fc0e2da46c5b28

Autorefresh is OFF

Tx hash: 5928c5ec9f7cbd579f5b5d57544005aead83674071666daa22fc0e2da46c5b28

Tx prefix hash: c3220cd68fa7d01f13e5ca5a508a8ba6053b9f396c68216023c63eef82f84ad2
Tx public key: d9aa17a09243828c7d302193fa03b6ef6250936e2ca67f1542ee84af1c5f1705
Payment id: d4f3bf22bc3c2db832eb7df7b2b8f9c81a7efc14979ef595e76edbc561743d60

Transaction 5928c5ec9f7cbd579f5b5d57544005aead83674071666daa22fc0e2da46c5b28 was carried out on the Monero network on 2014-06-24 00:23:46. The transaction has 3203154 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1403569426 Timestamp [UTC]: 2014-06-24 00:23:46 Age [y:d:h:m:s]: 10:175:09:36:06
Block: 98811 Fee (per_kB): 0.005000000000 (0.015753846154) Tx size: 0.3174 kB
Tx version: 1 No of confirmations: 3203154 RingCT/type: no
Extra: 022100d4f3bf22bc3c2db832eb7df7b2b8f9c81a7efc14979ef595e76edbc561743d6001d9aa17a09243828c7d302193fa03b6ef6250936e2ca67f1542ee84af1c5f1705

1 output(s) for total of 2.000000000000 xmr

stealth address amount amount idx tag
00: d5865f77d4ae84d45c3d031638454eb770ff038446ff4c61bc36744465744f02 2.000000000000 20000 of 434058 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-23 18:32:46 till 2014-06-24 01:03:28; resolution: 0.00 days)

  • |__________________________*_______________________________________________________________________________________________________________________________________________|
  • |________________________________________________________________________________________________________________________________________________*_________________________|

2 inputs(s) for total of 2.005000000000 xmr

key image 00: 3fe3c938234101a21758bb0433e42929102e51893ab24a92223203ddddb5a496 amount: 0.005000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f7ff82f3801fe36849409bc54d329b1fa26e708c957d96ed70d3b011624961e0 00098545 1 2/3 2014-06-23 19:32:46 10:175:14:27:06
key image 01: d228ad5c357c59667df92a83c31901655457d58c3a58efe8fc12c76946a2391d amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9ec2bc2cf584b3c5bcac63c13ad2c9f56a953ba38b3e8a550ea6c453eb2a49ba 00098798 1 8/45 2014-06-24 00:03:28 10:175:09:56:24
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000, "key_offsets": [ 174429 ], "k_image": "3fe3c938234101a21758bb0433e42929102e51893ab24a92223203ddddb5a496" } }, { "key": { "amount": 2000000000000, "key_offsets": [ 19989 ], "k_image": "d228ad5c357c59667df92a83c31901655457d58c3a58efe8fc12c76946a2391d" } } ], "vout": [ { "amount": 2000000000000, "target": { "key": "d5865f77d4ae84d45c3d031638454eb770ff038446ff4c61bc36744465744f02" } } ], "extra": [ 2, 33, 0, 212, 243, 191, 34, 188, 60, 45, 184, 50, 235, 125, 247, 178, 184, 249, 200, 26, 126, 252, 20, 151, 158, 245, 149, 231, 110, 219, 197, 97, 116, 61, 96, 1, 217, 170, 23, 160, 146, 67, 130, 140, 125, 48, 33, 147, 250, 3, 182, 239, 98, 80, 147, 110, 44, 166, 127, 21, 66, 238, 132, 175, 28, 95, 23, 5 ], "signatures": [ "7bbc73f6df12f210ee386262eb14b66b0cb1ab56385ac131ebaf404293f0470977beb35360bd20b5a67d9a3f8ff4a3c141f8aff12a91db4912219cdd0f8af405", "6ac03dcf1179eebb1c3ed180bba3d519dfe88ab343d7eebd123f7ff3d354910496a5881c9fbe29293f0358f19ffb46faad0ba8f0f3587730ca28dda23c49ae0e"] }


Less details
source code | moneroexplorer