Monero Transaction 5b209a4ed8d293c99417c84c062c5bf52d5cff11aa48704c8c934431e00c5948

Autorefresh is OFF

Tx hash: 5b209a4ed8d293c99417c84c062c5bf52d5cff11aa48704c8c934431e00c5948

Tx prefix hash: 103f0942354567100b5b4fde2a1ad44aced0ecf2a51074fa28e7655e5c72beaa
Tx public key: a114ec786d0d31cc6e195b05198c6015673b2c6cb9e0dc68f4683d78da13a823
Payment id: cd30644fdc7d428ea421854eadbdfd59ffff6b2bcc86aa396d6e7ff921c290e4

Transaction 5b209a4ed8d293c99417c84c062c5bf52d5cff11aa48704c8c934431e00c5948 was carried out on the Monero network on 2014-11-25 07:16:47. The transaction has 2975468 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1416899807 Timestamp [UTC]: 2014-11-25 07:16:47 Age [y:d:h:m:s]: 10:011:21:51:52
Block: 319938 Fee (per_kB): 0.010000000000 (0.017355932203) Tx size: 0.5762 kB
Tx version: 1 No of confirmations: 2975468 RingCT/type: no
Extra: 022100cd30644fdc7d428ea421854eadbdfd59ffff6b2bcc86aa396d6e7ff921c290e401a114ec786d0d31cc6e195b05198c6015673b2c6cb9e0dc68f4683d78da13a823

5 output(s) for total of 7.790000000000 xmr

stealth address amount amount idx tag
00: a3ee8c9ca1684abc5f4abd9ed14a92508dfa34c9636426b8a593264c5e70f493 0.090000000000 123900 of 317822 -
01: bd71f03a0d94b50cb279c62b77d35b196078785d0f3ae5aac527b55d5c56b044 0.200000000000 639259 of 1272210 -
02: 352442764fecb4a7201d0001425e9c63a27d70836ed869685c3265d504afb416 0.500000000000 479960 of 1118624 -
03: ee52ce4b6531c14bfae7044fa23864986da4ac69d918a979eb875ff634cdbb0b 2.000000000000 134556 of 434057 -
04: 5c17f9b5058f198715e5f50cfe6f5cafe8fe84ffa03f2060b1c2c0994420d8ae 5.000000000000 126939 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-11-25 00:15:17 till 2014-11-25 06:58:25; resolution: 0.00 days)

  • |__________________________*_______________________________________________________________________________________________________________________________________________|
  • |______________________________________________________________________________________*___________________________________________________________________________________|
  • |________________________________________________________________________________________________________________________________________________*_________________________|

3 inputs(s) for total of 7.800000000000 xmr

key image 00: 3d96098421b4ba75202795fb04f1eae38b84fb20952468c5b2b1fc49cd4318fb amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b1afc6827342d0d6762a5c2a2ed2f0eea7dff5b69accb5270a345b8290aee7da 00319563 1 1/4 2014-11-25 01:15:17 10:012:03:53:22
key image 01: 5f4e263b4a1045c67a5db344d46ef73bda18c0501ec43139bcae911248c97f23 amount: 0.800000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6f618b66b9707b126a5ed4d600801a72391cf37ef65332e62103e03fbd5fcb77 00319704 1 2/3 2014-11-25 03:40:07 10:012:01:28:32
key image 02: 115acef5e8e802e6402f9fdbe6cd3cb39971c7b76ac436a9d3b08d7b178daedd amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 52b21c3897ab001536472cf969072b5db78862624604699efbce376f486099cd 00319850 1 2/6 2014-11-25 05:58:25 10:011:23:10:14
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 4000000000000, "key_offsets": [ 133214 ], "k_image": "3d96098421b4ba75202795fb04f1eae38b84fb20952468c5b2b1fc49cd4318fb" } }, { "key": { "amount": 800000000000, "key_offsets": [ 204002 ], "k_image": "5f4e263b4a1045c67a5db344d46ef73bda18c0501ec43139bcae911248c97f23" } }, { "key": { "amount": 3000000000000, "key_offsets": [ 154470 ], "k_image": "115acef5e8e802e6402f9fdbe6cd3cb39971c7b76ac436a9d3b08d7b178daedd" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "a3ee8c9ca1684abc5f4abd9ed14a92508dfa34c9636426b8a593264c5e70f493" } }, { "amount": 200000000000, "target": { "key": "bd71f03a0d94b50cb279c62b77d35b196078785d0f3ae5aac527b55d5c56b044" } }, { "amount": 500000000000, "target": { "key": "352442764fecb4a7201d0001425e9c63a27d70836ed869685c3265d504afb416" } }, { "amount": 2000000000000, "target": { "key": "ee52ce4b6531c14bfae7044fa23864986da4ac69d918a979eb875ff634cdbb0b" } }, { "amount": 5000000000000, "target": { "key": "5c17f9b5058f198715e5f50cfe6f5cafe8fe84ffa03f2060b1c2c0994420d8ae" } } ], "extra": [ 2, 33, 0, 205, 48, 100, 79, 220, 125, 66, 142, 164, 33, 133, 78, 173, 189, 253, 89, 255, 255, 107, 43, 204, 134, 170, 57, 109, 110, 127, 249, 33, 194, 144, 228, 1, 161, 20, 236, 120, 109, 13, 49, 204, 110, 25, 91, 5, 25, 140, 96, 21, 103, 59, 44, 108, 185, 224, 220, 104, 244, 104, 61, 120, 218, 19, 168, 35 ], "signatures": [ "b6d22cb440b901601858a4c59fb09a4d81d6abd719922d4d9c9fc5e46efd7b018a61d0e19c22323db133431be623a2519690c37b81edb25e7556e2d2175a4b03", "e055ea673eebf91207d894029b59782c9f5819cb64b7d1fb8bcfbf02d9f57a06e2423f6139923a2930c028f0fee85ae64a7b839c70836bf35ce57a9bfa92b907", "43f4db487f895086dc99749df1b5c6491602333d8d6d85320d7dea766e992a0f9c6ed8e452c337009045020cd696c1fc87890736ca3d97b7510e9a8d32166a05"] }


Less details
source code | moneroexplorer