Monero Transaction 5bb10c65ae4af95626d990f3801376c7abbeaf2319fa5c01127aaae93d581de0

Autorefresh is OFF

Tx hash: 5bb10c65ae4af95626d990f3801376c7abbeaf2319fa5c01127aaae93d581de0

Tx prefix hash: 7bd2ca5e134e805f8f8b44c815aa420685d15f4d1d0ffc1eb8797b356f5b1399
Tx public key: 6d72c53616683f57afbc567f11fcd5e625726dc7088b61a24c5bee4b53534f2b

Transaction 5bb10c65ae4af95626d990f3801376c7abbeaf2319fa5c01127aaae93d581de0 was carried out on the Monero network on 2014-12-12 01:29:33. The transaction has 2959251 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1418347773 Timestamp [UTC]: 2014-12-12 01:29:33 Age [y:d:h:m:s]: 10:005:22:34:01
Block: 343824 Fee (per_kB): 0.010000000000 (0.024265402844) Tx size: 0.4121 kB
Tx version: 1 No of confirmations: 2959251 RingCT/type: no
Extra: 016d72c53616683f57afbc567f11fcd5e625726dc7088b61a24c5bee4b53534f2b

2 output(s) for total of 0.040000000000 xmr

stealth address amount amount idx tag
00: 8fea23d486fb75cba498eea6201c122602f0f15f707ac8924e6b34690d5f9d23 0.010000000000 351184 of 502466 -
01: fee35db84533bf045dfd4b6653e8fc9b59b1a9372920baa5d3fd19e5079bd4a4 0.030000000000 177026 of 324336 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-08 22:37:19 till 2014-12-11 08:13:42; resolution: 1.09 days)

  • |_*__________*_______________________________________*____________________________________________________________________________________________________________________*|

1 inputs(s) for total of 0.050000000000 xmr

key image 00: 3ad1c37ab0e8dbe79737d0eb5d04b317b614dcbea71ad93971656bf17f1d0919 amount: 0.050000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 414056a34b9c0592b93a9fba64a3c36b3ea30545f4d6368b19edb7f12af02cf9 00076794 1 5/115 2014-06-08 23:37:19 10:192:00:26:15
- 01: 16d0cbd982747ce3fa8fc568745a5d5613f0010f0dbd01d164264633e11d0fb3 00095805 1 2/109 2014-06-21 22:37:44 10:179:01:25:50
- 02: 65e774fbedc61ce39ac81d13ece268ac14ea2be76e5ca3fb08c05f535f43d596 00158399 0 0/6 2014-08-04 07:58:00 10:135:16:05:34
- 03: 67378c9d598aea1c794d5dc91814f4d91861d8270dfd4dd063a7fcb9cf17d752 00342758 4 1/4 2014-12-11 07:13:42 10:006:16:49:52
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 50000000000, "key_offsets": [ 40426, 53184, 20015, 18758 ], "k_image": "3ad1c37ab0e8dbe79737d0eb5d04b317b614dcbea71ad93971656bf17f1d0919" } } ], "vout": [ { "amount": 10000000000, "target": { "key": "8fea23d486fb75cba498eea6201c122602f0f15f707ac8924e6b34690d5f9d23" } }, { "amount": 30000000000, "target": { "key": "fee35db84533bf045dfd4b6653e8fc9b59b1a9372920baa5d3fd19e5079bd4a4" } } ], "extra": [ 1, 109, 114, 197, 54, 22, 104, 63, 87, 175, 188, 86, 127, 17, 252, 213, 230, 37, 114, 109, 199, 8, 139, 97, 162, 76, 91, 238, 75, 83, 83, 79, 43 ], "signatures": [ "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"] }


Less details
source code | moneroexplorer