Monero Transaction 5bd0fe2e288271a906be68e97aadddabc5214ae2dbdf2b19008c58e1b5ea896b

Autorefresh is OFF

Tx hash: 5bd0fe2e288271a906be68e97aadddabc5214ae2dbdf2b19008c58e1b5ea896b

Tx prefix hash: d71981d4c79e0e3a0786e698da90c42df64890bd656ba12eb5fd015ceecd6c69
Tx public key: fef3f7d98c8d8ff9a1a6d5ca284a43ebde012a2143dc2b6ce099adecfe7f0ea9

Transaction 5bd0fe2e288271a906be68e97aadddabc5214ae2dbdf2b19008c58e1b5ea896b was carried out on the Monero network on 2015-06-25 00:20:03. The transaction has 2673367 confirmations. Total output fee is 0.015220803118 XMR.

Timestamp: 1435191603 Timestamp [UTC]: 2015-06-25 00:20:03 Age [y:d:h:m:s]: 09:166:00:56:58
Block: 622598 Fee (per_kB): 0.015220803118 (0.022329659589) Tx size: 0.6816 kB
Tx version: 1 No of confirmations: 2673367 RingCT/type: no
Extra: 01fef3f7d98c8d8ff9a1a6d5ca284a43ebde012a2143dc2b6ce099adecfe7f0ea9

6 output(s) for total of 10.392986700000 xmr

stealth address amount amount idx tag
00: 61ee0f31225a1168e27db54282a1ac35c489dd824580eec6f237fcc3b72404aa 0.002986700000 2 of 5 -
01: 4d2edf78937e7e70157bc16c48aadef2020b0f901f2a762a80cd472154804026 0.040000000000 177674 of 294095 -
02: 0b2e1387958c862ae53f75ac35db95b0d3c1bfdd0056594be03d836601793f56 0.050000000000 163755 of 284521 -
03: 98f3c49dfcb5eb4f46c58cca8422d887945aa9c3fb25890413c18606bae80b78 0.600000000000 443203 of 650760 -
04: fab298b1cf39faee2af753ca445cb5b0d796d2647be02bbe6178dcd473e1f7d1 0.700000000000 328176 of 514467 -
05: 685e75446ddd0427e0fce79a628e4e453a977c9735715a5acaa1c364aa92c78e 9.000000000000 72780 of 274259 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-06-24 04:26:03 till 2015-06-24 22:19:24; resolution: 0.00 days)

  • |___________________________________________*______________________________________________________________________________________________________________________________|
  • |________________________________________________________________________________________________________________________________________________________________*_________|
  • |______________*___________________________________________________________________________________________________________________________________________________________|
  • |__________*_______________________________________________________________________________________________________________________________________________________________|

4 inputs(s) for total of 10.408207503118 xmr

key image 00: cf2dedfef48b657d92aea6ac824665f018d18f3106267cdcde0bfaadd94fef7a amount: 0.008207503118
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: cdf999d7e7b4d7f7aa0f8f38ca0937d0b8c63d08234fe362d03a7d668ffb1164 00621716 0 0/4 2015-06-24 08:54:51 09:166:16:22:10
key image 01: 299f58b1be7919265eda0ae687c9cb3b490c2dc3ca009e1a5c2aa349619ad396 amount: 0.700000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a7c4f7d5c418eda5025ec2a0e23cf98e46aceb8b20cef41c2198b466dde8e5fe 00622464 0 0/4 2015-06-24 21:19:24 09:166:03:57:37
key image 02: 53818261a314b0e6242f010be5b1a7164f8f7534ce13dfdbffe5f78415dcb6f7 amount: 9.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9c56a9a840902c495562ead8406d6971d8d1c1ef84f25afc0cc52754fcd50323 00621474 0 0/4 2015-06-24 05:49:28 09:166:19:27:33
key image 03: 767e2b44feba85a7c67da07ff3dca4fcac8e9d588b2cfe0d91cc8be88f930fc4 amount: 0.700000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4fd4b27ee5e87efa567ce5754eb622649e47b3bc1f4acad08c895e72d8075aa5 00621446 0 0/4 2015-06-24 05:26:03 09:166:19:50:58
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 8207503118, "key_offsets": [ 0 ], "k_image": "cf2dedfef48b657d92aea6ac824665f018d18f3106267cdcde0bfaadd94fef7a" } }, { "key": { "amount": 700000000000, "key_offsets": [ 327990 ], "k_image": "299f58b1be7919265eda0ae687c9cb3b490c2dc3ca009e1a5c2aa349619ad396" } }, { "key": { "amount": 9000000000000, "key_offsets": [ 71579 ], "k_image": "53818261a314b0e6242f010be5b1a7164f8f7534ce13dfdbffe5f78415dcb6f7" } }, { "key": { "amount": 700000000000, "key_offsets": [ 326861 ], "k_image": "767e2b44feba85a7c67da07ff3dca4fcac8e9d588b2cfe0d91cc8be88f930fc4" } } ], "vout": [ { "amount": 2986700000, "target": { "key": "61ee0f31225a1168e27db54282a1ac35c489dd824580eec6f237fcc3b72404aa" } }, { "amount": 40000000000, "target": { "key": "4d2edf78937e7e70157bc16c48aadef2020b0f901f2a762a80cd472154804026" } }, { "amount": 50000000000, "target": { "key": "0b2e1387958c862ae53f75ac35db95b0d3c1bfdd0056594be03d836601793f56" } }, { "amount": 600000000000, "target": { "key": "98f3c49dfcb5eb4f46c58cca8422d887945aa9c3fb25890413c18606bae80b78" } }, { "amount": 700000000000, "target": { "key": "fab298b1cf39faee2af753ca445cb5b0d796d2647be02bbe6178dcd473e1f7d1" } }, { "amount": 9000000000000, "target": { "key": "685e75446ddd0427e0fce79a628e4e453a977c9735715a5acaa1c364aa92c78e" } } ], "extra": [ 1, 254, 243, 247, 217, 140, 141, 143, 249, 161, 166, 213, 202, 40, 74, 67, 235, 222, 1, 42, 33, 67, 220, 43, 108, 224, 153, 173, 236, 254, 127, 14, 169 ], "signatures": [ "2dd1b74231c9107ebb13e0ac935c1311c4e7ce90eb06466f5645dffaf35e3f07bbe223ca0392ba5aaba05a814930309b1be4b48911d71bc13c125ea7a82a5904", "86baefde2e661c3b3c08f3277a9f8eb899957da2626e0b2efa6888901075e802ed141cf45b6b919c975a04c81d4898988a32df693d92344d37da3de91e9ddd02", "f1c2e4529fbffb32c2a05f92e37f5e9147539d9f02d3096ad55722831585d30ec05ecf8cb17622074e9e081bca7b19b48e4c998437dbb72fa0720f1e091c770d", "6cb4d1ff052b8b277f1ae68879e79458863ecf26d17f19531b29113d3d6e800712cd7b644ec9beb63300bcb01b76f12b3a282242cf21047cb6d249c7e104c30c"] }


Less details
source code | moneroexplorer