Monero Transaction 5bb514055adce5f7fec307cc4b530b1b0a0c4b2912d6aaa122f39bff2a083c18

Autorefresh is OFF

Tx hash: 5bb514055adce5f7fec307cc4b530b1b0a0c4b2912d6aaa122f39bff2a083c18

Tx prefix hash: 5c9b2f8e0a1e8661b839d796220975c6df8024f0e6e2e12e48c83b93fbb336d6
Tx public key: 0c424f72fe75d68530f77f6094c156ebfcdd37b2fe26e56a81e302e1f475e4f1
Payment id: 0000000000000000000000000000000000000000000000000000000000386905

Transaction 5bb514055adce5f7fec307cc4b530b1b0a0c4b2912d6aaa122f39bff2a083c18 was carried out on the Monero network on 2016-11-16 18:49:07. The transaction has 2106236 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1479322147 Timestamp [UTC]: 2016-11-16 18:49:07 Age [y:d:h:m:s]: 08:008:08:32:25
Block: 1181161 Fee (per_kB): 0.010000000000 (0.013781965007) Tx size: 0.7256 kB
Tx version: 1 No of confirmations: 2106236 RingCT/type: no
Extra: 010c424f72fe75d68530f77f6094c156ebfcdd37b2fe26e56a81e302e1f475e4f10221000000000000000000000000000000000000000000000000000000000000386905de20f9eb090be37c20d2531ffd2b8fabe0eb8a0bd795e6034d54ed364a789ca2881a

4 output(s) for total of 0.980000000000 xmr

stealth address amount amount idx tag
00: 0b630bddd151a357ab4c17f016b9ee08d194a63cbed37893ffbe0809af0374be 0.030000000000 301222 of 324336 -
01: 9a916dbd6fd4d2e2f75a4e889fa0627baaebb55146288481503e6977acd70704 0.050000000000 260298 of 284521 -
02: 7f63358659753e7022ae519f3937630d8d4776c13f9185a7c4abfbe14cf9728a 0.300000000000 917142 of 976536 -
03: dedf73c65a4b0812411dcce1b1b32cad70619bfb0848fdb5a145df92b7dd3038 0.600000000000 622420 of 650760 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-14 20:45:52 till 2016-11-16 19:11:29; resolution: 5.21 days)

  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |____*______*_____________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 0.990000000000 xmr

key image 00: 3018e1feb5d619256665d782d7e9a21fee1fa3e7bc424c28ec1f228524df1256 amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 56da4be1330c24f441431fa41867d5ce33d6a49a5ed9b1e9c77e078f745a9fe2 00085509 1 15/141 2014-06-14 21:45:52 10:164:05:35:40
- 01: 27d0e0cd06063c81061d07d1eeef0c4dfa777c7b3141bd1427650d042c360767 00087428 1 2/132 2014-06-16 06:13:52 10:162:21:07:40
- 02: 7239e80c0d292104fdb23b6b747f0ade0934dd1f522a3e84dd4421c0a2e4440f 01180972 3 1/23 2016-11-16 13:15:15 08:008:14:06:17
key image 01: eefae66a7b27240faad390f39062e856ad8b460b83d7153da5c31f9fce2dc52c amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 89e38995fc3dd90919a061ec6692ecffc185371a86f8bf220858214341e93f03 00114902 1 18/69 2014-07-05 04:09:27 10:143:23:12:05
- 01: 79f0be6af95aa3c2a804e846271233a0dc853f7ee0ca84b1886a7fc165ee92ce 00168274 1 39/4 2014-08-11 06:12:43 10:106:21:08:49
- 02: 3c38a29867d6c272d6271250dfbbe5d6fae5615244894d6ca2862a74a156a36a 01181138 3 1/24 2016-11-16 18:11:29 08:008:09:10:03
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 90000000000, "key_offsets": [ 45376, 4096, 230958 ], "k_image": "3018e1feb5d619256665d782d7e9a21fee1fa3e7bc424c28ec1f228524df1256" } }, { "key": { "amount": 900000000000, "key_offsets": [ 44696, 37890, 342585 ], "k_image": "eefae66a7b27240faad390f39062e856ad8b460b83d7153da5c31f9fce2dc52c" } } ], "vout": [ { "amount": 30000000000, "target": { "key": "0b630bddd151a357ab4c17f016b9ee08d194a63cbed37893ffbe0809af0374be" } }, { "amount": 50000000000, "target": { "key": "9a916dbd6fd4d2e2f75a4e889fa0627baaebb55146288481503e6977acd70704" } }, { "amount": 300000000000, "target": { "key": "7f63358659753e7022ae519f3937630d8d4776c13f9185a7c4abfbe14cf9728a" } }, { "amount": 600000000000, "target": { "key": "dedf73c65a4b0812411dcce1b1b32cad70619bfb0848fdb5a145df92b7dd3038" } } ], "extra": [ 1, 12, 66, 79, 114, 254, 117, 214, 133, 48, 247, 127, 96, 148, 193, 86, 235, 252, 221, 55, 178, 254, 38, 229, 106, 129, 227, 2, 225, 244, 117, 228, 241, 2, 33, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 56, 105, 5, 222, 32, 249, 235, 9, 11, 227, 124, 32, 210, 83, 31, 253, 43, 143, 171, 224, 235, 138, 11, 215, 149, 230, 3, 77, 84, 237, 54, 74, 120, 156, 162, 136, 26 ], "signatures": [ "7a9c6d00f71ed7926270c6c53b9a7d01d912546e5e3862f1a2725fd5a3939f0006f610991a10fa3337ee5bee6990c7b99f214846db907c94c5a34b46cd146707178f8dd9c9e6e640d9e05caf4c5b645198b28a2d0fc1f1a196826f88a089500cb5b9d7893e1ab367a2df63dc93d3dfc52a28932dd3cf1288162607bfe3e1910c119dcc1e0d38921c16d6237d64d6a7be6c85a0b1dc0bac653e5027c647134e0149848c71025b5a7e036155580c54ea2b12a28807f2bcc38d4aac2b1df3cd1c08", "83e4c5b0666905d618cba271d85a6e1c2116841fac057b31a4ddf1f472595e05757d64a611f721f4509b5e8f7d3b9aaaf0c45b448b53715ddc005b9cb34b890b60be87c86f8abe6031525302fae4ffde0e5b4c9129a3e7b88f465e9089852a051bf877df773bf42ce74d79b6acbdbffced78c37c6b2e209cf2b40378daadce0955aa80fbed2bafb8e0296dedd3b50faad41cbe448440d904b4eca1c288202c051b20352ec755ceb2ae90b014ad11d6367cedc01c707b91ff8aebaddb118bf10d"] }


Less details
source code | moneroexplorer