Monero Transaction 5bd1a0b0e33f72f3fc09357ae4e6772e36e654cf82ca80d47c813d207d13e682

Autorefresh is OFF

Tx hash: 5bd1a0b0e33f72f3fc09357ae4e6772e36e654cf82ca80d47c813d207d13e682

Tx public key: dec67241fc0a3fedce88a12c4cd6fcfd15a59fc61fd4c1e9d5d0b90906ee3860
Payment id: 0000000000000000000000000000000000000000000000000000000000566249

Transaction 5bd1a0b0e33f72f3fc09357ae4e6772e36e654cf82ca80d47c813d207d13e682 was carried out on the Monero network on 2017-01-01 09:19:55. The transaction has 2086912 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1483262395 Timestamp [UTC]: 2017-01-01 09:19:55 Age [y:d:h:m:s]: 07:346:17:38:32
Block: 1214118 Fee (per_kB): 0.010000000000 (0.010502564103) Tx size: 0.9521 kB
Tx version: 1 No of confirmations: 2086912 RingCT/type: no
Extra: 01dec67241fc0a3fedce88a12c4cd6fcfd15a59fc61fd4c1e9d5d0b90906ee38600221000000000000000000000000000000000000000000000000000000000000566249de2082a05bf93fb82ec61c8241e26dd7f3b30ad1fc3bb49afba423283200306327f1

17 output(s) for total of 0.490000000000 xmr

stealth address amount amount idx tag
00: dda0317d2c1576eb12a62c4419ba628708717e1eb6840e9a4f1eacde66ae8881 0.000000004000 12906 of 17290 -
01: fa799ba6401ca21eaabfc3c10ed1f665dada1335c8bd68b942215614bf65dd23 0.000000006000 13106 of 17377 -
02: 72971f2afea55cdfdfabb5bd1aadf7be989324c495a62cc22bffee6a88e45241 0.000000010000 17543 of 22371 -
03: e20614eff0a8562aa7bcd9df593af221d6a68512d988a160ac257969153aa1ed 0.000000080000 17999 of 22809 -
04: d4a3649b354ac9a3a55b8ef3d2e41951cbad22993497d9f9b3725eef067e8606 0.000000200000 18104 of 22931 -
05: 9f7607e413e0c3e6ca16319ab513d3924227b6e13fcac42ddbc77ff181de36f1 0.000000700000 17762 of 22578 -
06: cb567c2a6334e6462d72351b51cdef6dbb776deba1382b9bfc846f92ae9ec946 0.000002000000 36678 of 41703 -
07: 003d5d6d9703d8c714c9b7696f614fa28b250d6bdc3d18257d09414052d170a2 0.000007000000 36424 of 41473 -
08: 2fe239c3f9c53bd0770c50fff3fde3fcf4872932d12359a4d6361f7bf16e54b7 0.000040000000 53734 of 58748 -
09: ee72bbff75d31b79d34ab60df8e77bed6daecb3b4d744ad36a3562c40575504c 0.000050000000 53890 of 58905 -
10: d879cacd7ef5afb681a847bbedd6f22c0d2917e82055d4a83d8a6dfcc384b96c 0.000100000000 73310 of 79262 -
11: aa225e4370e2a29ca0864af954ac8257046afea4024e44da6a4e6f73bfaeded0 0.000800000000 72236 of 78160 -
12: 9e96c285f36cdb80f078a7151bdefab8c76ec80b0defa28e36c329cd52096feb 0.003000000000 81979 of 90176 -
13: fec12ce7e91c5ba566080ad10d99e1dfa7273316a054c55f8739201e683826f4 0.006000000000 247208 of 256624 -
14: 6eec29623d00c75af3aced60d0d15379e7240632e8709ed720b591315068f5ce 0.030000000000 315569 of 324336 -
15: 6971a60e078c99a0134d387d23887acda785ddd120ebff1310501e89f4811d13 0.050000000000 275403 of 284522 -
16: fe5a61dc58d6de5c7871da4d2ec83fbac1081145c862839d05026cd6f405d822 0.400000000000 677798 of 688584 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



1 inputs(s) for total of 0.500000000000 xmr

key image 00: 241001faa78d243353b9342024d565749385a4a50bd530d433186fab1aa4664f amount: 0.500000000000
ring members blk
- 00: a96923194cfb54a8760df30309c6a91a17d32a76e7cf0d420f0a7d3811c71e32 00084133
- 01: a9716127b21be13e2fee994ee63b3e42043345c862787fea483541c9550eeda4 00164238
- 02: 1ec2109bc1f8eb865454f5970ffafa25be9939a3c6c02eb4723cc80d00494960 01214085
More details
source code | moneroexplorer