Monero Transaction 5d3a042131a5d8069510f0364714f6da1670cb8d0e70ca0897059c5b9bb3403c

Autorefresh is OFF

Tx hash: 5d3a042131a5d8069510f0364714f6da1670cb8d0e70ca0897059c5b9bb3403c

Tx prefix hash: 38c647eaf6ff0d685fd6c4d713796d8340c68ec575562e5bd24252953aadc5b5
Tx public key: 7c1b4af278febb8b45decc2e94e3bcc50ccd64dccea7fcfb29b1af022e6279f9
Payment id: 098c684e782ab51422ab208bd6c0159beaa78b3171911ccd576616940d3e8079

Transaction 5d3a042131a5d8069510f0364714f6da1670cb8d0e70ca0897059c5b9bb3403c was carried out on the Monero network on 2014-08-04 10:25:30. The transaction has 3119854 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1407147930 Timestamp [UTC]: 2014-08-04 10:25:30 Age [y:d:h:m:s]: 10:101:04:19:03
Block: 158540 Fee (per_kB): 0.010000000000 (0.008641350211) Tx size: 1.1572 kB
Tx version: 1 No of confirmations: 3119854 RingCT/type: no
Extra: 022100098c684e782ab51422ab208bd6c0159beaa78b3171911ccd576616940d3e8079017c1b4af278febb8b45decc2e94e3bcc50ccd64dccea7fcfb29b1af022e6279f9

5 output(s) for total of 224.990000000000 xmr

stealth address amount amount idx tag
00: 0ff5427bb83a6c6c6c903b368e0c2c3f84af22ace818d70c8b7a2f269aa27754 0.090000000000 97548 of 317822 -
01: b21cef39fbae7f9edd144b3c1b4ce20f62fcf93ed4b811be58ba77745d284a12 0.900000000000 75645 of 454894 -
02: 3a609b59cfc7645100104583197f6637ec58a737e2e6241d7e47f233ec292ada 4.000000000000 32319 of 237197 -
03: d16bc7a887e9dbdf67d820be6abe3d0e02eaa98a3b5432af7bc8f24e90f1fc15 20.000000000000 8276 of 78991 -
04: de53a2917a848b9c3656f35e2be62e896505d7b8282a20f492719fadf45007a1 200.000000000000 2127 of 31883 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-06 15:13:59 till 2014-07-31 10:26:12; resolution: 0.50 days)

  • |_*_______________________*________________________________________________________________________________________________________*______________________________________*|
  • |__________________________________________________________________________________*_*______________*_____________________________________________________________________*|
  • |____________________________________________________*__________________________________*_________________________________________________________________________________*|

3 inputs(s) for total of 225.000000000000 xmr

key image 00: 1e12179c076fbc558a69aaded0ac8c1706ab2ec9a55fccbe20fa12b44a18499b amount: 200.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 00bccba539ef3d35d72283e2a6f865df03ce1d427803ea656bf02bd5e00043ab 00027586 4 108/7 2014-05-06 16:13:59 10:190:22:30:34
- 01: 5522ee93611f9cb300a444f05e9c7b7e60e0d82ff9d933f4132748093754eeea 00045862 1 78/7 2014-05-18 20:19:06 10:178:18:25:27
- 02: 22c4c1816aa73f45a39d0d39727b987e1ac6fb7125aaa8eb3e10540519e24ccf 00124161 1 144/2 2014-07-11 15:02:54 10:124:23:41:39
- 03: 7b9ba861c21feb0e738e523ab01e6f107a9772fb87be7683b99f6ea9be123671 00152696 1 24/8 2014-07-31 09:26:12 10:105:05:18:21
key image 01: 01a05f06ab18d8ff1a71873addb6682740e9dc775c16f48148f413fc75fbc6be amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: bd2658065f9aafd668a3330376a2b30ac43e2035631ac9e7ce07002f2b6330e5 00088434 1 2/13 2014-06-16 22:32:28 10:149:16:12:05
- 01: a0191f07028fbc5db94d343fee4faaa4e7f0ed88d262711410d3a43e856511d5 00089869 1 5/152 2014-06-17 22:48:18 10:148:15:56:15
- 02: 567710197c02054cb3f446ffcbbb6cbbd28c30e8667111985282c404c5a1792f 00101037 1 95/5 2014-06-25 14:25:16 10:141:00:19:17
- 03: 04fde9db51f5ed5a59511c55b7538c4eba1b641e4491ecc3414fdcb908bc7d17 00152696 1 24/8 2014-07-31 09:26:12 10:105:05:18:21
key image 02: ba3846088467edf6a32a4a18be465c17e17f6a5886c627a575eb7bcada83ef8e amount: 20.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4529c4dfb8d289ac278f4173e192c35527434da227377ac5582ded0c8ab123aa 00066200 1 75/189 2014-06-01 12:47:25 10:165:01:57:08
- 01: 33c5ffdf9ca7304e273359937dbcdc5175c8b1dc2d18f74530d4d59011048e7e 00092210 1 105/3 2014-06-19 12:39:44 10:147:02:04:49
- 02: ebd9a319ae3d6e632231c7764639ac1f7798a8d6ef54e26bad4d83c66e6325f0 00092368 1 17/3 2014-06-19 15:19:18 10:146:23:25:15
- 03: 45f8d379969fe438ecc5f41798df5d6c806a94a2a2647151b9bb65af1fa5c26b 00152696 1 24/8 2014-07-31 09:26:12 10:105:05:18:21
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 200000000000000, "key_offsets": [ 183, 427, 992, 431 ], "k_image": "1e12179c076fbc558a69aaded0ac8c1706ab2ec9a55fccbe20fa12b44a18499b" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 12990, 900, 5657, 61741 ], "k_image": "01a05f06ab18d8ff1a71873addb6682740e9dc775c16f48148f413fc75fbc6be" } }, { "key": { "amount": 20000000000000, "key_offsets": [ 794, 1635, 22, 5401 ], "k_image": "ba3846088467edf6a32a4a18be465c17e17f6a5886c627a575eb7bcada83ef8e" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "0ff5427bb83a6c6c6c903b368e0c2c3f84af22ace818d70c8b7a2f269aa27754" } }, { "amount": 900000000000, "target": { "key": "b21cef39fbae7f9edd144b3c1b4ce20f62fcf93ed4b811be58ba77745d284a12" } }, { "amount": 4000000000000, "target": { "key": "3a609b59cfc7645100104583197f6637ec58a737e2e6241d7e47f233ec292ada" } }, { "amount": 20000000000000, "target": { "key": "d16bc7a887e9dbdf67d820be6abe3d0e02eaa98a3b5432af7bc8f24e90f1fc15" } }, { "amount": 200000000000000, "target": { "key": "de53a2917a848b9c3656f35e2be62e896505d7b8282a20f492719fadf45007a1" } } ], "extra": [ 2, 33, 0, 9, 140, 104, 78, 120, 42, 181, 20, 34, 171, 32, 139, 214, 192, 21, 155, 234, 167, 139, 49, 113, 145, 28, 205, 87, 102, 22, 148, 13, 62, 128, 121, 1, 124, 27, 74, 242, 120, 254, 187, 139, 69, 222, 204, 46, 148, 227, 188, 197, 12, 205, 100, 220, 206, 167, 252, 251, 41, 177, 175, 2, 46, 98, 121, 249 ], "signatures": [ "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", "83903631d82ee9eaf0edb93177a79eb5f71a5cfe4172d3c85c0e01e486a212065f880abfda385b2002f567106b60534abd16e41a2bafc842f3f7a73d4d0d220931c8fa15d9a5707ca509786a918a10121acdab4e40dbd2fcd6eebeb7f9f7a1022997b8e75ef70375b14cdac7fb0a1d410c9305d05a19ed53200c160777badf0ea065d98d31203275404267ea47b18855b7d393a481ab34f25a5804868f4e780bdb775c48a1eef64840891682c0913cba32c6417fdbd6f54f97f15c8a96ea11015e9f6f14fffb39d12fb27ad2e5ac23ddc2d747f698f2935b902c08c7d27b5106ab83913297a919f955d11dceb866daf63819e9fe2f262688d21d1718c5a0b302", "5d7a5ec25b147a12e0bab96ece67627d2fa9812ec7e9fc65c8ee8b15099ded0520d4dc3b74298a64b78c8f5acdc93fcb3a10273962d4694f45f1567f168ea00413f478547a820323bf12e2711e6e70e66fc1376e21aad16d9259956ae1303300f2468c33817c9dfa6cf52f6169e721872dedb9b7ce2f476ba9a9ec3299be1704beb845471cf7e3dfaf3b8ab7b9685791850154dc0f35561db81d66db0687850e17243476eb7b1554b4950617db69d8e224a048a46eab960c8214f4db059f6e08648c6e54f68ea2d2439d23de9fb7f3638b0273a6fb9089982f9e118bcf5e340712a2340ff069f623b8faf2eb07fe7a859c40b05d6115c23219295711679c1c0b"] }


Less details
source code | moneroexplorer