Monero Transaction 5c2fb7413bc807845d2d48ddafe986dc5ba6ed6b723daac349417c8b1883baf9

Autorefresh is OFF

Tx hash: 5c2fb7413bc807845d2d48ddafe986dc5ba6ed6b723daac349417c8b1883baf9

Tx public key: 3df285d6a5298adcc7e613cdf591db0f4c4f97239209cad04f099c37807844c4
Payment id: b24cc73690697afd2fe175e332480b5b487492163aea07a47efad8a4fe726d26

Transaction 5c2fb7413bc807845d2d48ddafe986dc5ba6ed6b723daac349417c8b1883baf9 was carried out on the Monero network on 2014-08-06 06:22:49. The transaction has 3133363 confirmations. Total output fee is 0.006000000000 XMR.

Timestamp: 1407306169 Timestamp [UTC]: 2014-08-06 06:22:49 Age [y:d:h:m:s]: 10:121:16:18:06
Block: 161133 Fee (per_kB): 0.006000000000 (0.006981818182) Tx size: 0.8594 kB
Tx version: 1 No of confirmations: 3133363 RingCT/type: no
Extra: 022100b24cc73690697afd2fe175e332480b5b487492163aea07a47efad8a4fe726d26013df285d6a5298adcc7e613cdf591db0f4c4f97239209cad04f099c37807844c4

7 output(s) for total of 30.974000000000 xmr

stealth address amount amount idx tag
00: 925c8a9c2b2a440d89605ccc16703567e721a09dd78eda5f05b53057022b84d8 0.004000000000 33137 of 89181 -
01: 7236ec14458cba851858839d1c4f52f0b29be889935eab71dc37cf42f81db3d8 0.070000000000 92413 of 263947 -
02: aeb79f332f774cb13f2f4b22929bad10bde09c3cea25453360f23d778e959c0a 0.300000000000 147338 of 976536 -
03: 76b87121334913893b3924a284dc9bfad56338d146d3e052d472c3248522bedc 0.600000000000 132952 of 650760 -
04: fac9008fe1e341e75fcf99faa2f8a474ebb89a74c0f8f955929e7d1725d9706b 1.000000000000 168868 of 874629 -
05: 49e785fa79d99fa35d03717f859ecbe3c7b80ae8163bd0ae36af134c1f049179 9.000000000000 14563 of 274259 -
06: 59da00d939a52078aad23eafa1386f1fb623ca22b9d868a243e564dfa64891c3 20.000000000000 8446 of 78991 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



5 inputs(s) for total of 30.980000000000 xmr

key image 00: dcd1c58293ca9b0d6af9aae3203449c2d6bea260ccbf6214f9436a0643cb8cde amount: 0.050000000000
ring members blk
- 00: d4ad5b5a7c876769ee38feea6d1e397a723a4cd94988e53164c012a9b8c60ba8 00161102
key image 01: 70fdbc39dcf61b25cdd15aa5a77019ca37f370d774c895e83432429d3fc060cc amount: 0.900000000000
ring members blk
- 00: cd6156645c82d9d41720e3daea636781c286120ab8aeb7aa38605053e20b9b9b 00160493
key image 02: 3599e7ff45fb966a07c034e7662f1a4312536167d3f755b40310691f677a4e80 amount: 0.020000000000
ring members blk
- 00: e50bdd69f55bca70adf7b336474ab20a2ac3bf4106663f1a6fe3b63d1deb2fc9 00159919
key image 03: 58305d1e4f1c7ee2517079cc7bc691e656fdb77fabef953c6279837b188457ae amount: 0.010000000000
ring members blk
- 00: 27b50f82bfa5e77599583e42d5b76ac597183caf7da515fc53bc4289b459cece 00161049
key image 04: 0162875935d817826394247f0590e3fd2a84b319781c1e601886527cef397503 amount: 30.000000000000
ring members blk
- 00: b4cc73b54c73f3d774530d152610682980a7a51737377ac6a2c7a7ccd40a7b30 00161057
More details
source code | moneroexplorer