Monero Transaction 5b142317d086308d874ad13683d39968d3ba7ae12b3360ba4dde68f8303941f8

Autorefresh is OFF

Tx hash: 5b142317d086308d874ad13683d39968d3ba7ae12b3360ba4dde68f8303941f8

Tx prefix hash: 0cb2cbacb7faecb33192e10e566dc6689c4eb7cf8020159481f6caebe79dd91f
Tx public key: dfaf80fd85bf1fecfbb283c1c082b3392e33c661e9a82cf913dc7ce0c081d78e
Payment id: 64268d9fb57951fdd67c77f0b6cb0a997ca68becd3109c04d901f8e3bfd1ccf0

Transaction 5b142317d086308d874ad13683d39968d3ba7ae12b3360ba4dde68f8303941f8 was carried out on the Monero network on 2016-12-23 07:38:16. The transaction has 2088454 confirmations. Total output fee is 0.020000000000 XMR.

Timestamp: 1482478696 Timestamp [UTC]: 2016-12-23 07:38:16 Age [y:d:h:m:s]: 07:348:16:46:10
Block: 1207492 Fee (per_kB): 0.020000000000 (0.017181208054) Tx size: 1.1641 kB
Tx version: 1 No of confirmations: 2088454 RingCT/type: no
Extra: 02210064268d9fb57951fdd67c77f0b6cb0a997ca68becd3109c04d901f8e3bfd1ccf001dfaf80fd85bf1fecfbb283c1c082b3392e33c661e9a82cf913dc7ce0c081d78e

5 output(s) for total of 5.940000000000 xmr

stealth address amount amount idx tag
00: 44f64013e670fd0acc82b2c81e736cbad1a9cafdf2953582c8310f1f64f46a1f 0.040000000000 281473 of 294095 -
01: 5b5618b8028da7f09c6f16bd22f21d7b35c1dbd860ed09bf7dc093ba061d64b6 0.100000000000 959990 of 982315 -
02: f4bf3956ed32b3e77229ad1e7732c63ca032d13fcb52a7b20b603982d1f48647 0.800000000000 478337 of 489955 -
03: b025f38a21db4cbe646d68bdd213efca41a3ceba3c06633b5858da51fd8ceed7 1.000000000000 852346 of 874629 -
04: 71fef83282c34bd882b304b31398c406805f1a0b8b5ab82cd753e460c790dc4a 4.000000000000 230308 of 237197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-21 03:15:42 till 2016-12-22 18:46:15; resolution: 5.39 days)

  • |_*_________________________________________________________________________________*_________________________________________________________________*_______*____________|
  • |________*_*________________________________________________________________________________________________________________________________________________*___________*__|
  • |_______________________________________________________*_____________________________________________________________*______________________________*____________________*|

3 inputs(s) for total of 5.960000000000 xmr

key image 00: c55acd40fb4908542532731a3359af23d01496f516ee25f9a1b9a38a7b6a3bd0 amount: 0.060000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3e127afd3d22803f01ce7b6c6aaf7baeb7dfbc4c5db636a9038e1d79c00e91e4 00094618 1 2/55 2014-06-21 04:15:42 10:169:20:08:44
- 01: 2e75e65c0272e8b2354ccf21139337777716a4f7e61a4727629878795cac11a4 00732809 0 0/4 2015-09-10 05:28:08 09:088:18:56:18
- 02: f593e6d34cee1fae138aa331e99557f8304fb8c62ae97206ed9b61656e59d6df 01125910 6 2/3 2016-08-31 20:20:49 08:097:04:03:37
- 03: df28ac322152de9d2803b9886eed65a1535113c367a1e553dc0ef1b534a09ce6 01159293 0 0/5 2016-10-17 08:25:49 08:050:15:58:37
key image 01: 0342cc0f19f6e682785f0e0bf04f52340f3a44d49d1323bfe5ba97814c87fcfe amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: cd10070c04e495823e408f301cff28fa0985f92ca5cf341e925f83e203a9001c 00152070 1 16/58 2014-07-30 23:15:49 10:130:01:08:37
- 01: 1149d86fb6f289a4fc5aa15dfd91598c10310e80b25c1e382655134a00b5fa6a 00172574 0 0/6 2014-08-14 06:35:39 10:115:17:48:47
- 02: 0b0b90875cc2ab2ace69f231ef14592d7e132ddc3c0a196e2b83f8912f2b53df 01150007 3 1/3 2016-10-04 10:48:56 08:063:13:35:30
- 03: b38322adfe87bc391d43208e02c91e99a7cc3a88bf28ff253879ac3e927326d7 01197569 6 1/4 2016-12-09 13:34:43 07:362:10:49:43
key image 02: 3a2e1518f9c3987ac4c9d53d683b17c8dd3bb923b5f7406f036fd1b3b655e376 amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 30c5a2aedd13724c661d13096d6399e4837ba29e02eb003b881fec8a87ac7b0f 00521078 5 11/49 2015-04-14 23:33:44 09:237:00:50:42
- 01: 85ff1336e059bfae528339236726ab4871cab2d6fef5896b7597f6ba048aad72 00991969 1 3/10 2016-03-11 02:11:18 08:270:22:13:08
- 02: bd1358d035135797c82257593c64913e18a8b4681980dcd15e8392775b606e70 01124118 26 2/8 2016-08-29 11:31:48 08:099:12:52:38
- 03: 4965cd3a028871bcf90b1533f3df92bc881b1f34459770e73c79a280a0eb1d36 01207123 6 2/5 2016-12-22 17:46:15 07:349:06:38:11
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 60000000000, "key_offsets": [ 79382, 83165, 60005, 12902 ], "k_image": "c55acd40fb4908542532731a3359af23d01496f516ee25f9a1b9a38a7b6a3bd0" } }, { "key": { "amount": 900000000000, "key_offsets": [ 71065, 17042, 316398, 28702 ], "k_image": "0342cc0f19f6e682785f0e0bf04f52340f3a44d49d1323bfe5ba97814c87fcfe" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 159636, 44221, 16843, 26041 ], "k_image": "3a2e1518f9c3987ac4c9d53d683b17c8dd3bb923b5f7406f036fd1b3b655e376" } } ], "vout": [ { "amount": 40000000000, "target": { "key": "44f64013e670fd0acc82b2c81e736cbad1a9cafdf2953582c8310f1f64f46a1f" } }, { "amount": 100000000000, "target": { "key": "5b5618b8028da7f09c6f16bd22f21d7b35c1dbd860ed09bf7dc093ba061d64b6" } }, { "amount": 800000000000, "target": { "key": "f4bf3956ed32b3e77229ad1e7732c63ca032d13fcb52a7b20b603982d1f48647" } }, { "amount": 1000000000000, "target": { "key": "b025f38a21db4cbe646d68bdd213efca41a3ceba3c06633b5858da51fd8ceed7" } }, { "amount": 4000000000000, "target": { "key": "71fef83282c34bd882b304b31398c406805f1a0b8b5ab82cd753e460c790dc4a" } } ], "extra": [ 2, 33, 0, 100, 38, 141, 159, 181, 121, 81, 253, 214, 124, 119, 240, 182, 203, 10, 153, 124, 166, 139, 236, 211, 16, 156, 4, 217, 1, 248, 227, 191, 209, 204, 240, 1, 223, 175, 128, 253, 133, 191, 31, 236, 251, 178, 131, 193, 192, 130, 179, 57, 46, 51, 198, 97, 233, 168, 44, 249, 19, 220, 124, 224, 192, 129, 215, 142 ], "signatures": [ "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", "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", "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"] }


Less details
source code | moneroexplorer