Monero Transaction 5d9980129dc04d8656d8be599908c81d8b087e1493655a487079f8989f6ff3ad

Autorefresh is OFF

Tx hash: 5d9980129dc04d8656d8be599908c81d8b087e1493655a487079f8989f6ff3ad

Tx prefix hash: 181c9a7ed817b133716df9e095ee6284ece01917dee4c1ea8f21a714665392b5
Tx public key: 987ee77756ade09d5772c1947f0b0137e1a5f6f1d77cbb2e392e119ea1309d22
Payment id: fe7270840d19b30c97791b3ad24cbadfc866e32a6f282f881f3f03a784d7884f

Transaction 5d9980129dc04d8656d8be599908c81d8b087e1493655a487079f8989f6ff3ad was carried out on the Monero network on 2014-07-23 19:58:00. The transaction has 3136340 confirmations. Total output fee is 0.009905705368 XMR.

Timestamp: 1406145480 Timestamp [UTC]: 2014-07-23 19:58:00 Age [y:d:h:m:s]: 10:112:10:40:05
Block: 141815 Fee (per_kB): 0.009905705368 (0.021176288720) Tx size: 0.4678 kB
Tx version: 1 No of confirmations: 3136340 RingCT/type: no
Extra: 022100fe7270840d19b30c97791b3ad24cbadfc866e32a6f282f881f3f03a784d7884f01987ee77756ade09d5772c1947f0b0137e1a5f6f1d77cbb2e392e119ea1309d22

5 output(s) for total of 2.490094294632 xmr

stealth address amount amount idx tag
00: dafc70ff2f29790e9fdb2633356bca12ed16d4dbb665fde13c9398de1e5d5657 0.000094294632 0 of 1 -
01: bc14ce080c2fa7ea95c4e61463bf93b7004734b45256854163e673be030f2381 0.020000000000 202710 of 381491 -
02: 5250a932dca9757d335ca82abf84489ba632966f8331b88e6286466ccc6ffdb2 0.070000000000 86178 of 263947 -
03: 237da27258c137ea64475b7c0bee4f47c902f390c01cda3c5085dc518a26b2cb 0.400000000000 109206 of 688584 -
04: 37038a7ff9af03e7386a819d6299021c37f590672d5bb99b717d22180ed450e4 2.000000000000 51580 of 434057 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-23 04:03:06 till 2014-07-23 17:14:29; resolution: 0.00 days)

  • |_____________*____________________________________________________________________________________________________________________________________________________________|
  • |_____________________________________________________________________________________________________________________________________________________________*____________|

2 inputs(s) for total of 2.500000000000 xmr

key image 00: 6d6e1f559a3c90bd8792c7a18afcb9886af6420a1e0201d1d1cae95129ecdb43 amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9211f519d9ba6f7cbe7c7fd5cde0385f43e738674d6ccd9bc840a534feefd278 00140877 1 5/8 2014-07-23 05:03:06 10:113:01:34:59
key image 01: c445c581038af71b3d901e973d9d0de7d46266fcb696d401ba105e3886d92fdf amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 75afef2ce411d8f7efa4e3ef2324e88e4a4645b0b0b1073881dbc55cc8dc37ee 00141592 1 1/7 2014-07-23 16:14:29 10:112:14:23:36
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 2000000000000, "key_offsets": [ 50730 ], "k_image": "6d6e1f559a3c90bd8792c7a18afcb9886af6420a1e0201d1d1cae95129ecdb43" } }, { "key": { "amount": 500000000000, "key_offsets": [ 155496 ], "k_image": "c445c581038af71b3d901e973d9d0de7d46266fcb696d401ba105e3886d92fdf" } } ], "vout": [ { "amount": 94294632, "target": { "key": "dafc70ff2f29790e9fdb2633356bca12ed16d4dbb665fde13c9398de1e5d5657" } }, { "amount": 20000000000, "target": { "key": "bc14ce080c2fa7ea95c4e61463bf93b7004734b45256854163e673be030f2381" } }, { "amount": 70000000000, "target": { "key": "5250a932dca9757d335ca82abf84489ba632966f8331b88e6286466ccc6ffdb2" } }, { "amount": 400000000000, "target": { "key": "237da27258c137ea64475b7c0bee4f47c902f390c01cda3c5085dc518a26b2cb" } }, { "amount": 2000000000000, "target": { "key": "37038a7ff9af03e7386a819d6299021c37f590672d5bb99b717d22180ed450e4" } } ], "extra": [ 2, 33, 0, 254, 114, 112, 132, 13, 25, 179, 12, 151, 121, 27, 58, 210, 76, 186, 223, 200, 102, 227, 42, 111, 40, 47, 136, 31, 63, 3, 167, 132, 215, 136, 79, 1, 152, 126, 231, 119, 86, 173, 224, 157, 87, 114, 193, 148, 127, 11, 1, 55, 225, 165, 246, 241, 215, 124, 187, 46, 57, 46, 17, 158, 161, 48, 157, 34 ], "signatures": [ "aef455f112c2e82fa66726110252be56ebe690cfe1f6362bbd95077e9175210e57bd687ce7b9bb23c08d1cde039ce2378fb24ca4f46988c9a6d3de731071c10f", "9eadc97d927d77f831527a613f8dfe33ef851fa2ad6612308874a7ade0c7b60c8cfb604645860aaec3b21d474baf690334e0110de58a300ba7fd6a0d0de8fe0c"] }


Less details
source code | moneroexplorer