Monero Transaction 5b308edb4ab350f5c60147b0bfde2660fb3dbf832b493e6c5d235a2181588635

Autorefresh is OFF

Tx hash: 5b308edb4ab350f5c60147b0bfde2660fb3dbf832b493e6c5d235a2181588635

Tx prefix hash: a78130de2c39134fb2f00f99f28449d6f28068f0a98ff20dea7b133590f67a5d
Tx public key: b3afa21303af42f6b6fb85d985f706afed7f70596e90fda1b4baea1bbefd8eba
Payment id: 5851085aab7e42069213862e100335f670eaf6d8e94440158f2b7fd2aed3cd52

Transaction 5b308edb4ab350f5c60147b0bfde2660fb3dbf832b493e6c5d235a2181588635 was carried out on the Monero network on 2014-12-07 21:21:52. The transaction has 2950614 confirmations. Total output fee is 0.020561673361 XMR.

Timestamp: 1417987312 Timestamp [UTC]: 2014-12-07 21:21:52 Age [y:d:h:m:s]: 09:354:22:04:00
Block: 338015 Fee (per_kB): 0.020561673361 (0.023137531342) Tx size: 0.8887 kB
Tx version: 1 No of confirmations: 2950614 RingCT/type: no
Extra: 0221005851085aab7e42069213862e100335f670eaf6d8e94440158f2b7fd2aed3cd5201b3afa21303af42f6b6fb85d985f706afed7f70596e90fda1b4baea1bbefd8eba

5 output(s) for total of 63.240000000000 xmr

stealth address amount amount idx tag
00: 15ff5a535be333c72fb3035fcbb5b394b2cb98a318628d7c954644e3edbae51f 0.040000000000 147345 of 294095 -
01: b3d34695e3a9bfee1607ec43747f4ef433371457c00391b652559a5aa196fb43 0.200000000000 666502 of 1272210 -
02: 6833f218ffd9f06417c44a8f1970f240eb5898a0ac46ec64d847253162890aa9 5.000000000000 131069 of 255089 -
03: ddc04da7fb8b78c5cc5bc669178102cf696c1ded98dae1f5c1c670fc696ec7e3 8.000000000000 26370 of 226902 -
04: fcd6f51fed9e54278911233ae1c32a37043b936896c783f5ec7a0b3bb0c73a82 50.000000000000 9859 of 44703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-12-07 04:32:12 till 2014-12-07 21:02:38; resolution: 0.00 days)

  • |_______________________________________________________________________________________________________________________________________________________________*__________|
  • |_______________________________________________________________________________________________________________________________________________*__________________________|
  • |_______________________________________________________________________________________________________________________________________________________________*__________|
  • |____________________________________________________________________________________*_____________________________________________________________________________________|
  • |__________________________________________________________________________________________________*_______________________________________________________________________|
  • |___________*______________________________________________________________________________________________________________________________________________________________|

6 inputs(s) for total of 63.260561673361 xmr

key image 00: 9da4cac747569ebe8da65d17d6822d4e9a4dc26f68fbce5c13966820acfe12f6 amount: 0.010561673361
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 686947b30a8e75d3a6d633513d12b743a721b56b2ecf596a820b583c818120ca 00337948 0 0/3 2014-12-07 20:02:38 09:354:23:23:14
key image 01: 6c150c7d2a5b3a1ff65754e39f253044ba31e63115c4ac50e68d00cd221af7cd amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 15b414a96fe7dee82d208da7bdcb69c58851909fef68a50e84c713b0a3239b33 00337876 0 0/4 2014-12-07 18:24:33 09:355:01:01:19
key image 02: c75652d4a7f8405dd92b810657d0f58c5cab9fc08cccbf84b2f570fb38d228f5 amount: 0.700000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5b465a3e185c1fb30c64bf38e79f2e16ded546389f5c856e85eaea36e4f24303 00337948 1 3/50 2014-12-07 20:02:38 09:354:23:23:14
key image 03: 97f45200c92971ef1064ade39b8622f4d177de28776bbefdd36dca2a52100d72 amount: 0.050000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 01deb4a69ad4c5d311c0a7c410c9d05b8e6a86a052d485085373589886280b10 00337501 1 5/3 2014-12-07 12:40:26 09:355:06:45:26
key image 04: 6f7435d86a53d1dc75425b4f5c0004d8d6c6ee103033a17e5668da5e9520d605 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 75cd5d67919c008d93f506d4eb0699c3fd97864bd4a75247c75181758d5116e9 00337627 1 3/5 2014-12-07 14:05:30 09:355:05:20:22
key image 05: 56657ff2b278c9ee7bb72ce26b6fcb97f8e1a1cb611d8615ab5ef3822f57c9ac amount: 60.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 569ecd25151a80cef36b71add2074ca71d18ac45da1a7d671d1a99bd647584fd 00337032 1 3/5 2014-12-07 05:32:12 09:355:13:53:40
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 10561673361, "key_offsets": [ 0 ], "k_image": "9da4cac747569ebe8da65d17d6822d4e9a4dc26f68fbce5c13966820acfe12f6" } }, { "key": { "amount": 2000000000000, "key_offsets": [ 154873 ], "k_image": "6c150c7d2a5b3a1ff65754e39f253044ba31e63115c4ac50e68d00cd221af7cd" } }, { "key": { "amount": 700000000000, "key_offsets": [ 218389 ], "k_image": "c75652d4a7f8405dd92b810657d0f58c5cab9fc08cccbf84b2f570fb38d228f5" } }, { "key": { "amount": 50000000000, "key_offsets": [ 132101 ], "k_image": "97f45200c92971ef1064ade39b8622f4d177de28776bbefdd36dca2a52100d72" } }, { "key": { "amount": 500000000000, "key_offsets": [ 505852 ], "k_image": "6f7435d86a53d1dc75425b4f5c0004d8d6c6ee103033a17e5668da5e9520d605" } }, { "key": { "amount": 60000000000000, "key_offsets": [ 4513 ], "k_image": "56657ff2b278c9ee7bb72ce26b6fcb97f8e1a1cb611d8615ab5ef3822f57c9ac" } } ], "vout": [ { "amount": 40000000000, "target": { "key": "15ff5a535be333c72fb3035fcbb5b394b2cb98a318628d7c954644e3edbae51f" } }, { "amount": 200000000000, "target": { "key": "b3d34695e3a9bfee1607ec43747f4ef433371457c00391b652559a5aa196fb43" } }, { "amount": 5000000000000, "target": { "key": "6833f218ffd9f06417c44a8f1970f240eb5898a0ac46ec64d847253162890aa9" } }, { "amount": 8000000000000, "target": { "key": "ddc04da7fb8b78c5cc5bc669178102cf696c1ded98dae1f5c1c670fc696ec7e3" } }, { "amount": 50000000000000, "target": { "key": "fcd6f51fed9e54278911233ae1c32a37043b936896c783f5ec7a0b3bb0c73a82" } } ], "extra": [ 2, 33, 0, 88, 81, 8, 90, 171, 126, 66, 6, 146, 19, 134, 46, 16, 3, 53, 246, 112, 234, 246, 216, 233, 68, 64, 21, 143, 43, 127, 210, 174, 211, 205, 82, 1, 179, 175, 162, 19, 3, 175, 66, 246, 182, 251, 133, 217, 133, 247, 6, 175, 237, 127, 112, 89, 110, 144, 253, 161, 180, 186, 234, 27, 190, 253, 142, 186 ], "signatures": [ "ae98c2193ef7a8e2bf9269da495be51f9cfed4c5c146afbd7162f2f122fc4f0428c82d53d6dfa660201e45480c2477e46d3525265619bc56e77d95a5002e4008", "c6b87e9f1469131f75385b41af2956a43c25abd4746da29e28c63c64effde502e0c08f9c94b169c796b06c557a61cdab07d551d17182ebe21000f412e088380c", "0459f6d78df47beb2af00fe508208c2e487c064fd689fe73833675f52792410e40682b4572e8de60dce14b2ae836ffa5c89c1653b6116d361d0dad551ca27102", "14d14fe116cab5db499f6d4d1ce17bfc68c97e308b9ffa9455eea712b767070d8538ff83b5e2b848f4180d845e09e718eda722ebdd81c5f521a86942ab6d0d0f", "a2f1087ae7f164008b1ac243e810e17267351344354f8eb8c30acb2324311b0374b8b1f074900b7ab401c891eb3c6f5e78f67db8ecc28ab64041b67b078dfe05", "dc4240afc850483a9ba212f882b1c79a1db36118d228bb31909136ce518eab00f7de34f075ef633ec68c5d256119ee2e8a15086ce069a736b71b8ff9add24906"] }


Less details
source code | moneroexplorer