Monero Transaction 5a709c1dd84f74dce1dd3668e7e264da28b51b24dd0540871e6f3be49bc7da76

Autorefresh is OFF

Tx hash: 5a709c1dd84f74dce1dd3668e7e264da28b51b24dd0540871e6f3be49bc7da76

Tx prefix hash: 8f04197a8e6b89147eb149f8f2048b9d3bcc66b1bbdca763a09f5f0e4644a80e
Tx public key: dada01cb927673bc471b8f0d19a111576472302dc4abb14393457711f32c2319
Payment id: d2a08dfdb1445ab22e308fadc6fc68b28e3432306342e2259bc0a0beb8bd1bbc

Transaction 5a709c1dd84f74dce1dd3668e7e264da28b51b24dd0540871e6f3be49bc7da76 was carried out on the Monero network on 2014-08-05 06:16:04. The transaction has 3127673 confirmations. Total output fee is 0.005580110000 XMR.

Timestamp: 1407219364 Timestamp [UTC]: 2014-08-05 06:16:04 Age [y:d:h:m:s]: 10:112:19:31:09
Block: 159681 Fee (per_kB): 0.005580110000 (0.006046595386) Tx size: 0.9229 kB
Tx version: 1 No of confirmations: 3127673 RingCT/type: no
Extra: 022100d2a08dfdb1445ab22e308fadc6fc68b28e3432306342e2259bc0a0beb8bd1bbc01dada01cb927673bc471b8f0d19a111576472302dc4abb14393457711f32c2319

9 output(s) for total of 16.094419890000 xmr

stealth address amount amount idx tag
00: 4002e209fd60575ab3dbdd81626c495172c0dcb079a8beabb5bce99313bf4687 0.000419890000 2 of 4 -
01: 8988cd1bd7c271687a11e26d37f659eae981269a6be63c94e1586eccf831f622 0.005000000000 202896 of 308585 -
02: ef30d9462ea96c70297951754762d955a007179d24cd5765bfdebd9af32fa091 0.009000000000 157388 of 233398 -
03: 9d00011c333861cf53e79c1fb546189e46196045ec42209f6ea254e25588d9f7 0.020000000000 209246 of 381492 -
04: 8195c2984d90729daf0d15ee4774a564554abe32237b20d0d4d543c57ae8ce1c 0.060000000000 100874 of 264760 -
05: 33b04a3ec893d5a98fe140fb1c6cd9887dc2eab74d7539d7424c4b012fb0ec55 0.200000000000 320452 of 1272210 -
06: d3a0466f027fb3847a7d48e47e20c5174d79179fff4b747e4fdfebee8974a359 0.800000000000 99405 of 489955 -
07: a4dcbc33f546c9c8c369c8f77be4855b6643058c48b419f2d116972a99f6c874 7.000000000000 48310 of 285521 -
08: 788953c57955c9632dfaac59aacb348a0b385d2ce270006333dc3a07000eef11 8.000000000000 12587 of 226902 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-04 14:54:38 till 2014-08-05 06:22:21; resolution: 0.36 days)

  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |_________________________________________________*_______________________________________________________________________________________________________________________*|
  • |_______________________________________________________________________________________________________________________________*_________________________________________*|

3 inputs(s) for total of 16.100000000000 xmr

key image 00: 923fc479f05b442f154c5089dcd892c6a9bd9063c2932b246a4e5f30da766281 amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4cda135001377a542035c441437c0fff99daff6bab515ce7c212e643529043a2 00070627 1 4/133 2014-06-04 15:54:38 10:174:09:52:35
- 01: e660067f6bd5336460c59f45c14fb74bed2c2ec148c74d80a5e3e02643d66b13 00159582 0 0/5 2014-08-05 04:50:07 10:112:20:57:06
key image 01: 5179b5bdca2bd1451f09114fe39392265b1bd500dd36af495e0bdec4a22f317f amount: 6.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 84a838eea4368f09f02525f024584a0ee613d66fd2c8c0f3bf626cd38ca7c558 00096071 0 0/5 2014-06-22 03:14:42 10:156:22:32:31
- 01: 0f67d61ca9db8dc50b8afeb37d343267b23815141f5ab035007b16aa0a3fde81 00159610 2 5/9 2014-08-05 05:22:21 10:112:20:24:52
key image 02: bc3bb4c5c84041867cd9c124a8b71b71d20e818c3d318adc14c3ce315c706d31 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0cbb71fc586604a8611d7245720545576f2d86b43d3483ffd0e271055cf80541 00137149 0 0/6 2014-07-20 14:26:05 10:128:11:21:08
- 01: 3bd51b75c2270f43c6895ee9a9f1441fcf5a2330c88818cca5c6fc297b301ec0 00159479 0 0/6 2014-08-05 02:49:31 10:112:22:57:42
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 100000000000, "key_offsets": [ 35277, 338561 ], "k_image": "923fc479f05b442f154c5089dcd892c6a9bd9063c2932b246a4e5f30da766281" } }, { "key": { "amount": 6000000000000, "key_offsets": [ 59429, 14204 ], "k_image": "5179b5bdca2bd1451f09114fe39392265b1bd500dd36af495e0bdec4a22f317f" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 155798, 27208 ], "k_image": "bc3bb4c5c84041867cd9c124a8b71b71d20e818c3d318adc14c3ce315c706d31" } } ], "vout": [ { "amount": 419890000, "target": { "key": "4002e209fd60575ab3dbdd81626c495172c0dcb079a8beabb5bce99313bf4687" } }, { "amount": 5000000000, "target": { "key": "8988cd1bd7c271687a11e26d37f659eae981269a6be63c94e1586eccf831f622" } }, { "amount": 9000000000, "target": { "key": "ef30d9462ea96c70297951754762d955a007179d24cd5765bfdebd9af32fa091" } }, { "amount": 20000000000, "target": { "key": "9d00011c333861cf53e79c1fb546189e46196045ec42209f6ea254e25588d9f7" } }, { "amount": 60000000000, "target": { "key": "8195c2984d90729daf0d15ee4774a564554abe32237b20d0d4d543c57ae8ce1c" } }, { "amount": 200000000000, "target": { "key": "33b04a3ec893d5a98fe140fb1c6cd9887dc2eab74d7539d7424c4b012fb0ec55" } }, { "amount": 800000000000, "target": { "key": "d3a0466f027fb3847a7d48e47e20c5174d79179fff4b747e4fdfebee8974a359" } }, { "amount": 7000000000000, "target": { "key": "a4dcbc33f546c9c8c369c8f77be4855b6643058c48b419f2d116972a99f6c874" } }, { "amount": 8000000000000, "target": { "key": "788953c57955c9632dfaac59aacb348a0b385d2ce270006333dc3a07000eef11" } } ], "extra": [ 2, 33, 0, 210, 160, 141, 253, 177, 68, 90, 178, 46, 48, 143, 173, 198, 252, 104, 178, 142, 52, 50, 48, 99, 66, 226, 37, 155, 192, 160, 190, 184, 189, 27, 188, 1, 218, 218, 1, 203, 146, 118, 115, 188, 71, 27, 143, 13, 25, 161, 17, 87, 100, 114, 48, 45, 196, 171, 177, 67, 147, 69, 119, 17, 243, 44, 35, 25 ], "signatures": [ "a832b0105f1bfa59388e8e71caa63f970607bf52d1aecccf12eaf4f0c0a7ab07ded1a7173042f8fb4641111974f013021db7175f07ba3ff70688aa47aa967e067331d190cb8e419f4ca666b9c205840574933fb9a262c4c13215c267995e6305bbe84d2a3b56db4d7703ec059a836522ab6a28cc30ebdd80d1d3726d3388a605", "73ca5deee3d8a761dbbea1b33f59460c6a0fc63082dbdb780ab97030ad9d9b0b58f93aa40f0c2e5cbfdb10abc206173a4ed25d606315cfe96cedd5e2ee996d06147302becc4a2ea66eabec7c6a06d6e6c26fe87e5d2ec1d90bd5bff550765e0c35a83cfb5fe3ad43b168b6eaa6146bea9edf3f0145cd6d0e3f3aa452ffc36402", "ae023726e960f73f080b6143f9fbfa66da58f41e6c5b181c01556548901f1e0ca40c37a2b427b85b867ab4eb608e0552e7a071759a13b677066a6a3132ffec098a8872f0058a8439d5bebfb5dd4bf09dc315cdc271a75b09d6365fc0a14ec203dbe983bd2d6f2b37ddd6ff324ba0813d2847b243e985e11422ca18d3ac532d0f"] }


Less details
source code | moneroexplorer