Monero Transaction 5b2d2c4555f85bf35107c8306000aa7f44f34ddc76157e1027d83e3750a9e6c4

Autorefresh is OFF

Tx hash: 5b2d2c4555f85bf35107c8306000aa7f44f34ddc76157e1027d83e3750a9e6c4

Tx prefix hash: 08d8acb377396146720483bb434f567b3b3a7bbaea734700a67a19274a0fc6a4
Tx public key: a4e7eec9a746f784087a4b332999cdda2298fb92549850a0589dbd529c25ccd9

Transaction 5b2d2c4555f85bf35107c8306000aa7f44f34ddc76157e1027d83e3750a9e6c4 was carried out on the Monero network on 2016-02-16 20:04:34. The transaction has 2342982 confirmations. Total output fee is 0.014030460901 XMR.

Timestamp: 1455653074 Timestamp [UTC]: 2016-02-16 20:04:34 Age [y:d:h:m:s]: 08:302:20:46:19
Block: 959182 Fee (per_kB): 0.014030460901 (0.017891895346) Tx size: 0.7842 kB
Tx version: 1 No of confirmations: 2342982 RingCT/type: no
Extra: 01a4e7eec9a746f784087a4b332999cdda2298fb92549850a0589dbd529c25ccd9

9 output(s) for total of 7.124331160000 xmr

stealth address amount amount idx tag
00: 409295f5e0fdf0d2a7f1cd07403d4ad7899f4973612d21e6d7c57467d452a0d8 0.000000060000 581 of 22632 -
01: d91ffbe0abba529ce4a2a339dff458ad805663c2dbcfead65ae9dee942fb684a 0.000000100000 522 of 22829 -
02: b6ea537711aa11472eea1cf629899ea13d3533a15f0523457bccfad16344ffb1 0.000001000000 19133 of 42360 -
03: 737fb9138c6ebcfd1ad068c8cf73c85efd348ead4fa08297d0c20aaf9c82cd89 0.000030000000 35748 of 59485 -
04: 800d6377715b1ba56e39de88f4bb38062e92c57a2f329173669a2ca069513e42 0.000300000000 36655 of 78258 -
05: 4ef4bb42ede7958f61c3d3857d6ffb84ab528f57940c481196c3cfc1c063f1ee 0.004000000000 36824 of 89181 -
06: 38198f904ae773ee211f9c67562b71b6db3ea55aba9341ee35837625724cff41 0.060000000000 193219 of 264760 -
07: 331d8226bd3c4f18ee085853dcb489ee639970c5d69a0cf08cbe29e3f3814cee 0.060000000000 193220 of 264760 -
08: 1cb78569bd7fbb6bb9a719f4a43f8b7dbc81b69537876023e45ab385a18ebdce 7.000000000000 233002 of 285521 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-12-29 21:04:30 till 2016-02-14 11:27:19; resolution: 0.27 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_____________________________________________________________________________________________________________________________________________________________________*____|
  • |_________________________________________________________________________________________________________________________________________________________*________________|

4 inputs(s) for total of 7.138361620901 xmr

key image 00: d2ef43320459c9e27fab23e99fdaad2dbbb21bbf236e77f709307011eeb11687 amount: 0.008361620901
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 99b8fa26b71195a949efbb8a9c90c0eecb31bc5a7333b21194be27968177d659 00889960 0 0/4 2015-12-29 22:04:30 08:351:18:46:23
key image 01: 9b9fd034e34ad011b120524192749aaf6ca96b52772d5f887183f4e4073661dc amount: 0.060000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1832c9ae66beee4014531af91147955ff8ae646501f2a421449e3134638d4e20 00955725 0 0/4 2016-02-14 10:27:19 08:305:06:23:34
key image 02: c9995c1bbf80797002d48958f9cbca9ca7d1681971cb4e7022e3a00d460420c9 amount: 7.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b1369fbea30231e96e3acf10c85778576fd73a7781dafebc746a5f0b86fc2ceb 00953929 0 0/4 2016-02-13 05:25:43 08:306:11:25:10
key image 03: b8c9f97f4dff1abd517a0d7b0cb12f7e1830cd7b53193dba5e53513d1fe73039 amount: 0.070000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0b9c1a4faa2d878961a2d1e1dd74c36c5f0e240a6875fcbbcc20388399430596 00949418 1 4/12 2016-02-10 00:06:29 08:309:16:44:24
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 8361620901, "key_offsets": [ 0 ], "k_image": "d2ef43320459c9e27fab23e99fdaad2dbbb21bbf236e77f709307011eeb11687" } }, { "key": { "amount": 60000000000, "key_offsets": [ 192517 ], "k_image": "9b9fd034e34ad011b120524192749aaf6ca96b52772d5f887183f4e4073661dc" } }, { "key": { "amount": 7000000000000, "key_offsets": [ 227198 ], "k_image": "c9995c1bbf80797002d48958f9cbca9ca7d1681971cb4e7022e3a00d460420c9" } }, { "key": { "amount": 70000000000, "key_offsets": [ 184658 ], "k_image": "b8c9f97f4dff1abd517a0d7b0cb12f7e1830cd7b53193dba5e53513d1fe73039" } } ], "vout": [ { "amount": 60000, "target": { "key": "409295f5e0fdf0d2a7f1cd07403d4ad7899f4973612d21e6d7c57467d452a0d8" } }, { "amount": 100000, "target": { "key": "d91ffbe0abba529ce4a2a339dff458ad805663c2dbcfead65ae9dee942fb684a" } }, { "amount": 1000000, "target": { "key": "b6ea537711aa11472eea1cf629899ea13d3533a15f0523457bccfad16344ffb1" } }, { "amount": 30000000, "target": { "key": "737fb9138c6ebcfd1ad068c8cf73c85efd348ead4fa08297d0c20aaf9c82cd89" } }, { "amount": 300000000, "target": { "key": "800d6377715b1ba56e39de88f4bb38062e92c57a2f329173669a2ca069513e42" } }, { "amount": 4000000000, "target": { "key": "4ef4bb42ede7958f61c3d3857d6ffb84ab528f57940c481196c3cfc1c063f1ee" } }, { "amount": 60000000000, "target": { "key": "38198f904ae773ee211f9c67562b71b6db3ea55aba9341ee35837625724cff41" } }, { "amount": 60000000000, "target": { "key": "331d8226bd3c4f18ee085853dcb489ee639970c5d69a0cf08cbe29e3f3814cee" } }, { "amount": 7000000000000, "target": { "key": "1cb78569bd7fbb6bb9a719f4a43f8b7dbc81b69537876023e45ab385a18ebdce" } } ], "extra": [ 1, 164, 231, 238, 201, 167, 70, 247, 132, 8, 122, 75, 51, 41, 153, 205, 218, 34, 152, 251, 146, 84, 152, 80, 160, 88, 157, 189, 82, 156, 37, 204, 217 ], "signatures": [ "14922529ebc1007e72dfd15b920acddb22d24b4201571f33d7feabe49ac58f0b6da0d4028ce1c8e70a4d185181c95520d4ddf9b942d0e0f7aa9ab071b2ed7f09", "86c995c9d0603fc89b269e9bca198832729f4357232c377685250b0246ad5e09870bdc2943ca82795847cdaef9cff620b8f4c75dc843040c6fa795368a5a6a00", "1b0aef69f77dbaadb30d2b71200842cec3a82622dd5c4148cede724200405b0f20fa20ed0624255d3c31cdbc22d1c858d63c31c62a2bfea4cb12f003a6126409", "e3de6ce5e47db5a87c81ac4e8ad6eb0b60a59facb527b9c911db99ffc7773305f91bfa19a987360aaabe919ec28d13554da981fc695f94ff6623836202b9350f"] }


Less details
source code | moneroexplorer