Monero Transaction 5dbeba1aa0384f7e6389f723156698e71c06d5f8c2c23f91205a81e86265009a

Autorefresh is OFF

Tx hash: 5dbeba1aa0384f7e6389f723156698e71c06d5f8c2c23f91205a81e86265009a

Tx prefix hash: f6b0092265a656a1e55f87868d45df28e2aa283157ec44803a4a272cd15234a7
Tx public key: cfe214ab6e60d4e3fde8fe149293a1335e26f67c445b7ffb41b17d38ea905964
Payment id: 6740a878c6b7b8f05a1c64ac693909ebc257a2e6b4fbee1c00fccc22488d9e9a

Transaction 5dbeba1aa0384f7e6389f723156698e71c06d5f8c2c23f91205a81e86265009a was carried out on the Monero network on 2015-02-09 20:15:56. The transaction has 2866762 confirmations. Total output fee is 0.026066180507 XMR.

Timestamp: 1423512956 Timestamp [UTC]: 2015-02-09 20:15:56 Age [y:d:h:m:s]: 09:301:05:24:48
Block: 429214 Fee (per_kB): 0.026066180507 (0.042843930721) Tx size: 0.6084 kB
Tx version: 1 No of confirmations: 2866762 RingCT/type: no
Extra: 0221006740a878c6b7b8f05a1c64ac693909ebc257a2e6b4fbee1c00fccc22488d9e9a01cfe214ab6e60d4e3fde8fe149293a1335e26f67c445b7ffb41b17d38ea905964

6 output(s) for total of 10.018081990000 xmr

stealth address amount amount idx tag
00: 02de7fc0e7b06f30fcc22b862212493052a7d6e04dc435f3f83dbb6b9fac5039 0.008081990000 0 of 1 -
01: faf49c72b2d68079b614f38674d4aff1bfa18771de51877853fe8f846485456f 0.050000000000 138808 of 284521 -
02: 40f0e5908d17d252e74622c3c9de024bae5389123df49b788bc88dd87d4492d8 0.060000000000 124920 of 264760 -
03: 9f04dc4f7ab4be77eaa15c62f83b805c3f2031f8ebef66d55f299fc6de0efac4 0.900000000000 206208 of 454894 -
04: b9bf387cc0d339f96a880f68d0fd2eb5daf24576285a6de8b3cb70cf507f9e8a 3.000000000000 174638 of 300495 -
05: 0353d7492f27d49d48d1306fa389b063478cba7df6e2cff827d0b287be8ca779 6.000000000000 98674 of 207703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-02-08 13:19:20 till 2015-02-09 19:23:29; resolution: 0.01 days)

  • |____________________________________________________________________________________________________________________________________________________________________*_____|
  • |______*___________________________________________________________________________________________________________________________________________________________________|
  • |___________________________________________________________________________________________________________________________*______________________________________________|

3 inputs(s) for total of 10.044148170507 xmr

key image 00: 420bceb67c1d9ecb06815fa1345f4f6372c60266d6c7921f34a01d940bf2e39e amount: 0.012961074169
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3e4fb41b4f9ad9eec3787e5e941538e071536d48465c45bbfd0df6192cdba742 00429112 0 0/4 2015-02-09 18:23:29 09:301:07:17:15
key image 01: 1bf83b13412e66ca8f059645dfda5d2e9f6b66d15423222c220229cd90b626ae amount: 0.031187096338
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: df5ef415d992dc3fd41f38b05696e801f3c8823316138669b259c4414ba35009 00427481 0 0/4 2015-02-08 14:19:20 09:302:11:21:24
key image 02: 6470ded83a3a540e92efee5850f33c9a33147805284213b5e905f4d8af677f77 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5bef96697f40b6924ada4178b2987f4afc4d2baa44f45d94c774af7af97ad58c 00428654 0 0/4 2015-02-09 11:09:34 09:301:14:31:10
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 12961074169, "key_offsets": [ 0 ], "k_image": "420bceb67c1d9ecb06815fa1345f4f6372c60266d6c7921f34a01d940bf2e39e" } }, { "key": { "amount": 31187096338, "key_offsets": [ 0 ], "k_image": "1bf83b13412e66ca8f059645dfda5d2e9f6b66d15423222c220229cd90b626ae" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 494076 ], "k_image": "6470ded83a3a540e92efee5850f33c9a33147805284213b5e905f4d8af677f77" } } ], "vout": [ { "amount": 8081990000, "target": { "key": "02de7fc0e7b06f30fcc22b862212493052a7d6e04dc435f3f83dbb6b9fac5039" } }, { "amount": 50000000000, "target": { "key": "faf49c72b2d68079b614f38674d4aff1bfa18771de51877853fe8f846485456f" } }, { "amount": 60000000000, "target": { "key": "40f0e5908d17d252e74622c3c9de024bae5389123df49b788bc88dd87d4492d8" } }, { "amount": 900000000000, "target": { "key": "9f04dc4f7ab4be77eaa15c62f83b805c3f2031f8ebef66d55f299fc6de0efac4" } }, { "amount": 3000000000000, "target": { "key": "b9bf387cc0d339f96a880f68d0fd2eb5daf24576285a6de8b3cb70cf507f9e8a" } }, { "amount": 6000000000000, "target": { "key": "0353d7492f27d49d48d1306fa389b063478cba7df6e2cff827d0b287be8ca779" } } ], "extra": [ 2, 33, 0, 103, 64, 168, 120, 198, 183, 184, 240, 90, 28, 100, 172, 105, 57, 9, 235, 194, 87, 162, 230, 180, 251, 238, 28, 0, 252, 204, 34, 72, 141, 158, 154, 1, 207, 226, 20, 171, 110, 96, 212, 227, 253, 232, 254, 20, 146, 147, 161, 51, 94, 38, 246, 124, 68, 91, 127, 251, 65, 177, 125, 56, 234, 144, 89, 100 ], "signatures": [ "988e66a5742d46a9cc4633ccfd460c416543897c3a8723a044d0008a33b0f201fbac040f08b56cb54998d45ef81046dda1812e5a8310dde1eb0bc61be9ffa403", "4482436e63963044bef3a07a3db641357f3461d70155a3fde8f59f44e8037706ae1ced26fe5cb172f44a64b95a3c560eae7783f01b6f64598a8f8b3d7e61a908", "e365eec777aaaa260779a4d4bd9867e4db23192abbdc7b49b4eb5f3524dc5a0261827ec7e318387372fd42670b772ee11d820ff6ee87ba0039375a94bd23b105"] }


Less details
source code | moneroexplorer