Monero Transaction 5a210c64e7eed4a1b8b3a5f24401ff2d44290059a1c03111aadd2667d147a152

Autorefresh is OFF

Tx hash: 5a210c64e7eed4a1b8b3a5f24401ff2d44290059a1c03111aadd2667d147a152

Tx prefix hash: d93cfdb6cee7532040392ce3d8bfced2256b10fad53b2ef1ad5e3ba9302ab2d1
Tx public key: ddc62b572fe8a7c4997d1e81dfb458c9a1d64907e8b2c733ceb2ffc202b8f4fb
Payment id: cf57e816e10c1bb62e9ec5f6c346540b23b3c830e7de8903441b559b8acfb0c2

Transaction 5a210c64e7eed4a1b8b3a5f24401ff2d44290059a1c03111aadd2667d147a152 was carried out on the Monero network on 2014-06-29 10:05:28. The transaction has 3183073 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1404036328 Timestamp [UTC]: 2014-06-29 10:05:28 Age [y:d:h:m:s]: 10:152:22:04:05
Block: 106613 Fee (per_kB): 0.010000000000 (0.016569579288) Tx size: 0.6035 kB
Tx version: 1 No of confirmations: 3183073 RingCT/type: no
Extra: 022100cf57e816e10c1bb62e9ec5f6c346540b23b3c830e7de8903441b559b8acfb0c201ddc62b572fe8a7c4997d1e81dfb458c9a1d64907e8b2c733ceb2ffc202b8f4fb

3 output(s) for total of 2.380000000000 xmr

stealth address amount amount idx tag
00: a7fae5f60900e41879007f1603e9973903916e42deb4b06fc71a62fe797d8065 0.080000000000 72467 of 269576 -
01: 52aa4218d15a1eb6ea121fa76dfbdb1bf398254954cea3e49cac8142f8e6fa0f 0.300000000000 71185 of 976536 -
02: fa8e6ff6741105e8f9e531676403ce8813f64ff52aa48cf45345985203be9455 2.000000000000 25483 of 434057 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-28 22:16:51 till 2014-06-29 08:35:43; resolution: 0.00 days)

  • |_________________*________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________*________________|
  • |_______________________________________________________________________________________________________________________*__________________________________________________|
  • |__________________________________________________________________________*_______________________________________________________________________________________________|

4 inputs(s) for total of 2.390000000000 xmr

key image 00: cadf99fb8e82001c8dc39be2b45af9c0568dc1eb21e8029bed4a5b20dec11a64 amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 340641f5154db732864f41fed0b87fdfeb79a93fcd8dfea63e7fd6fc89d83c6d 00105913 1 3/2 2014-06-28 23:16:51 10:153:08:52:42
key image 01: 4aca8ae03465c279c03a1f21eae8e4a1ad6be255f88565a4f6c4ee321f51e72e amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7510f451f53e807244f284dbd595d600ded7b53316b8ea5d26e9bf1819209e08 00106446 1 6/25 2014-06-29 07:35:43 10:153:00:33:50
key image 02: 1336dcbd0c23cc053ff02586fc57a6fadc9da7cd3ebf17c7ba5feef5a7d91ac9 amount: 0.800000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6a4e37ce21673ad6cfba064ff1ae56d1ef20be5448a0edcaf80fb48d3a2b3157 00106304 1 22/57 2014-06-29 05:30:13 10:153:02:39:20
key image 03: 6ec4ea735052ddd217b5a2a95c0edf456c12ff56a315566311fd10547e48f9af amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e7d559c1980d9b4b225f0db005fcc6865a977d5fdc3db531ebac477c3ce065ac 00106115 1 16/63 2014-06-29 02:45:42 10:153:05:23:51
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 90000000000, "key_offsets": [ 69971 ], "k_image": "cadf99fb8e82001c8dc39be2b45af9c0568dc1eb21e8029bed4a5b20dec11a64" } }, { "key": { "amount": 500000000000, "key_offsets": [ 71811 ], "k_image": "4aca8ae03465c279c03a1f21eae8e4a1ad6be255f88565a4f6c4ee321f51e72e" } }, { "key": { "amount": 800000000000, "key_offsets": [ 34040 ], "k_image": "1336dcbd0c23cc053ff02586fc57a6fadc9da7cd3ebf17c7ba5feef5a7d91ac9" } }, { "key": { "amount": 1000000000000, "key_offsets": [ 55787 ], "k_image": "6ec4ea735052ddd217b5a2a95c0edf456c12ff56a315566311fd10547e48f9af" } } ], "vout": [ { "amount": 80000000000, "target": { "key": "a7fae5f60900e41879007f1603e9973903916e42deb4b06fc71a62fe797d8065" } }, { "amount": 300000000000, "target": { "key": "52aa4218d15a1eb6ea121fa76dfbdb1bf398254954cea3e49cac8142f8e6fa0f" } }, { "amount": 2000000000000, "target": { "key": "fa8e6ff6741105e8f9e531676403ce8813f64ff52aa48cf45345985203be9455" } } ], "extra": [ 2, 33, 0, 207, 87, 232, 22, 225, 12, 27, 182, 46, 158, 197, 246, 195, 70, 84, 11, 35, 179, 200, 48, 231, 222, 137, 3, 68, 27, 85, 155, 138, 207, 176, 194, 1, 221, 198, 43, 87, 47, 232, 167, 196, 153, 125, 30, 129, 223, 180, 88, 201, 161, 214, 73, 7, 232, 178, 199, 51, 206, 178, 255, 194, 2, 184, 244, 251 ], "signatures": [ "ab638067af17a5585dd07c180b63dd14145d780c034100bd2b133d0c1b903d0bfbd4d8365b7b1fe83092eef294c5f6b93ef097e8ac33557e1badb1fbebbd660e", "020a697abc376e6ab7af0f4165d01a5afb3c54ad4a09dd3c6b3fe64ae79bf0001eb94be269946fe8847c38553bc6ec567f19314bbcf1f1660505353336146e0f", "fe6366aaa702e53914ab5fc6c96c2199130e9542a4a5905b0abed90033d2cb0b8c49e9e1a098b9e846c94913b1adcaad2d9f58ec0bddcc2de05f4aecd4bb670c", "6c7331eda77c59d28a70b3fcff786686ca44b9c6b207f6e48dbeada3a3429603d6127148af6c8981416ee9b2614b37244356e3cdb33683fb93218c2a6b4cd40d"] }


Less details
source code | moneroexplorer