Monero Transaction 5acff353a47f9e84aeccd87180f0ca85b8f1506124d1a7d5e8cf35612a966401

Autorefresh is OFF

Tx hash: 5acff353a47f9e84aeccd87180f0ca85b8f1506124d1a7d5e8cf35612a966401

Tx public key: 5a30b34d817543640550e2bf94f540f5bbbeeb21179d86e810e257bad2066c8f
Payment id: d1fb9d8a75b128d2cce820273009dbeacd66ae014c374090d7808b8cc8593340

Transaction 5acff353a47f9e84aeccd87180f0ca85b8f1506124d1a7d5e8cf35612a966401 was carried out on the Monero network on 2016-02-01 19:55:37. The transaction has 2365093 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1454356537 Timestamp [UTC]: 2016-02-01 19:55:37 Age [y:d:h:m:s]: 08:319:02:00:49
Block: 937917 Fee (per_kB): 0.100000000000 (0.117296678121) Tx size: 0.8525 kB
Tx version: 1 No of confirmations: 2365093 RingCT/type: no
Extra: 015a30b34d817543640550e2bf94f540f5bbbeeb21179d86e810e257bad2066c8f022100d1fb9d8a75b128d2cce820273009dbeacd66ae014c374090d7808b8cc8593340

7 output(s) for total of 6.009285481637 xmr

stealth address amount amount idx tag
00: b52b977486f73d1ff7d4f1d7d4df2d0378caa86cf3c59ab7a7f7a1be4b61d871 0.002242168394 0 of 1 -
01: a0924776a009ccf76279b697e6220fb3a1c0f1e4aeb4c87591136d6aa23871c6 0.010000000000 423903 of 502466 -
02: 1ba5accd43ec84e74ab605b06336ea2d45aa1ba713e482b2f1d73b433ca6001c 0.000043313243 0 of 1 -
03: 6849af538201d1b7518616a5a9b2fa0d745f9eb40eb88c0fd67704c9593d465a 0.007000000000 194376 of 247341 -
04: 20321cbc6b25122f1862befce8d8a901cbe433715152f02b1bf46d67a0f50c26 0.090000000000 213607 of 317822 -
05: 90231624c04dedd80273607e766acd2f07bac0ce712bf708d312597379e92793 0.900000000000 331705 of 454894 -
06: a467e16a8664441a9cb186ab2a291b72d1d7514e1cbf99539e811fa440e168fc 5.000000000000 199017 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



5 inputs(s) for total of 6.109285481637 xmr

key image 00: db8fa28679d5a9ca66e68e2331e10f12887abd55bdedbc9775a96c4c51d31be7 amount: 0.001285481637
ring members blk
- 00: 3b732972258cd7c30cfe1fff0c76a6973d91d949714c7ee13aceed04eb893257 00929319
key image 01: 8dd67af7ab9611ea8c466ae53a8aa17622a05f52f6ed8d865b83130d5fdacbe3 amount: 0.010000000000
ring members blk
- 00: 768f52ca861b872f59bde28dfaf329566d2c6e8c14a6e672dcae0d40cdbe25a4 00937001
key image 02: 53b3bd16315cb58b79df1019dc4c68e0fdb95990b02257c7df5b50c3bf53a69c amount: 0.090000000000
ring members blk
- 00: fef26669ab6321bfa5022861ef3b54925db8e2fab474391857d54370b8e52bf0 00937575
key image 03: 035a639bc33d60f6076018a611ef47d152c8cb1d059d6a9aa93cf06fd6fa4260 amount: 0.008000000000
ring members blk
- 00: e2ff036b2051d885fc56e026f6724d411a24183e18ee870eb0050cf2bfc3bb8a 00937653
key image 04: be083610d1cc06d35f3ef8cd069f7e186259dad2583fecb6a62483502755420a amount: 6.000000000000
ring members blk
- 00: f4dd0457e4979c4d7417e509519a58374c430678316535041dcc6827be31f613 00937222
More details
source code | moneroexplorer