Monero Transaction 5f3d9d094a81ca60c1e83c084a2b28f31707f8db8595a6c84e82fe08e878f190

Autorefresh is OFF

Tx hash: 5f3d9d094a81ca60c1e83c084a2b28f31707f8db8595a6c84e82fe08e878f190

Tx prefix hash: ddd9ed7c4113493222be35ae3fb04d6be77c1d507fd6caedf45b19dd7ef2a7f2
Tx public key: 309b3fd2668a2d6cec7a11cab28c16bc9687e2383ca1e12a3aa284843c0423a6

Transaction 5f3d9d094a81ca60c1e83c084a2b28f31707f8db8595a6c84e82fe08e878f190 was carried out on the Monero network on 2014-07-17 19:43:01. The transaction has 3145292 confirmations. Total output fee is 0.005169677580 XMR.

Timestamp: 1405626181 Timestamp [UTC]: 2014-07-17 19:43:01 Age [y:d:h:m:s]: 10:118:19:59:16
Block: 133128 Fee (per_kB): 0.005169677580 (0.005299048891) Tx size: 0.9756 kB
Tx version: 1 No of confirmations: 3145292 RingCT/type: no
Extra: 01309b3fd2668a2d6cec7a11cab28c16bc9687e2383ca1e12a3aa284843c0423a6

11 output(s) for total of 15.495000000000 xmr

stealth address amount amount idx tag
00: c3627759d751f7875099ee1ae58bd819a2bbffb5dfa4b40e07874b351e818c0d 0.005000000000 189916 of 308584 -
01: 33ed092aaac58fb14c3a3356790c1bdc56e1ff7ec6609b91ee76ec310daa046e 0.090000000000 82893 of 317822 -
02: 068c0d968e557c45ffeafcf0640a95294a5dd32ee5bf351138b33aa78652259a 0.100000000000 287346 of 982315 -
03: a478b04eb1f9cfae898dd4dce1b1cd2fe7cc7087dc17164a21ac9a5ec5c49548 0.100000000000 287347 of 982315 -
04: e9ac52edcc7dc5bfe178e8d3b5627c7f81da439763a037a63b17fbb68a808fa3 0.300000000000 104802 of 976536 -
05: c1f8dd6a94f04f7de040a35d1d9446425d4a2d44f8c4d28c3f712dfa50c7ba8e 0.400000000000 91144 of 688584 -
06: b5fff28d00a08121d13e065b12392a9c34a715b35e3e92919f2a3d37e0aec6f2 0.500000000000 135187 of 1118624 -
07: 7152fc1d8d15667ac69e99f29d27747d65940d3a1dff4ad3d9d0babcf9ae3309 1.000000000000 111517 of 874629 -
08: 1a784ac2ea4a9f54335632d9d125fc4845309734106041f2cb322710d241cbf7 1.000000000000 111518 of 874629 -
09: 8ef553d7ea04e5c3201a782ec556a836c8c233ced253bff4226cf6da261aceec 2.000000000000 45103 of 434057 -
10: ef1a66cef5c2b344434542f4750d1cc929d894f9eec0f4ea2ed00abf5b1072ae 10.000000000000 150688 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-06 09:58:22 till 2014-07-17 20:02:24; resolution: 0.07 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |___________________________________________________________________________________________________________________________________________________________________*______|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |________________________________________________________________________________________________________________________________________________________________________*_|

5 inputs(s) for total of 15.500169677580 xmr

key image 00: e3744d6d0cb9a923c29c0b57c86adfc69cb66b4bff9c27196db51ef4af1ac876 amount: 0.000169677580
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 75aeb9fc9157b16294ac9dab5439fb05fae927c28e216a36e67cae6e8e9173d4 00116776 0 0/6 2014-07-06 10:58:22 10:130:04:43:55
key image 01: 0a08515ea31e981f74eaa6aed55dfc09b30583ef0f311f94bfa64ed547816dbd amount: 8.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f3fee03e2ecf56f5dc82ec77e8d979a96db873e6ab992ca0884978565f9f11af 00132457 1 13/10 2014-07-17 08:52:05 10:119:06:50:12
key image 02: bcbdd114db00e881f23bda30b5932b5c2456b1cfa9708755ce5295b2a2c12a24 amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4e7960ca8c9aa5accd8147c4bb25cb075af31566a4c1ca2129690660b3ea1e75 00133096 1 13/7 2014-07-17 19:02:24 10:118:20:39:53
key image 03: 019ed5db3e84a48c363adde6049029d120c9c3052119c662420300e71bd8bdb1 amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7a9dbcef69ed1cb3a7bef62ee577315fef60d62e3487dc7d42278505fa598c92 00133059 0 0/6 2014-07-17 18:29:36 10:118:21:12:41
key image 04: 08b685f2fefc0e101d90cb0f76e2c5114f9f64e6e4a350302f6121346ce56756 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 27ef1d7b9b54239f43d41c58b7cb33a3b1342c371d13d4123df83dfeda9ddb8b 00133027 0 0/6 2014-07-17 17:51:08 10:118:21:51:09
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 169677580, "key_offsets": [ 0 ], "k_image": "e3744d6d0cb9a923c29c0b57c86adfc69cb66b4bff9c27196db51ef4af1ac876" } }, { "key": { "amount": 8000000000000, "key_offsets": [ 9347 ], "k_image": "0a08515ea31e981f74eaa6aed55dfc09b30583ef0f311f94bfa64ed547816dbd" } }, { "key": { "amount": 2000000000000, "key_offsets": [ 45087 ], "k_image": "bcbdd114db00e881f23bda30b5932b5c2456b1cfa9708755ce5295b2a2c12a24" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 57684 ], "k_image": "019ed5db3e84a48c363adde6049029d120c9c3052119c662420300e71bd8bdb1" } }, { "key": { "amount": 500000000000, "key_offsets": [ 135015 ], "k_image": "08b685f2fefc0e101d90cb0f76e2c5114f9f64e6e4a350302f6121346ce56756" } } ], "vout": [ { "amount": 5000000000, "target": { "key": "c3627759d751f7875099ee1ae58bd819a2bbffb5dfa4b40e07874b351e818c0d" } }, { "amount": 90000000000, "target": { "key": "33ed092aaac58fb14c3a3356790c1bdc56e1ff7ec6609b91ee76ec310daa046e" } }, { "amount": 100000000000, "target": { "key": "068c0d968e557c45ffeafcf0640a95294a5dd32ee5bf351138b33aa78652259a" } }, { "amount": 100000000000, "target": { "key": "a478b04eb1f9cfae898dd4dce1b1cd2fe7cc7087dc17164a21ac9a5ec5c49548" } }, { "amount": 300000000000, "target": { "key": "e9ac52edcc7dc5bfe178e8d3b5627c7f81da439763a037a63b17fbb68a808fa3" } }, { "amount": 400000000000, "target": { "key": "c1f8dd6a94f04f7de040a35d1d9446425d4a2d44f8c4d28c3f712dfa50c7ba8e" } }, { "amount": 500000000000, "target": { "key": "b5fff28d00a08121d13e065b12392a9c34a715b35e3e92919f2a3d37e0aec6f2" } }, { "amount": 1000000000000, "target": { "key": "7152fc1d8d15667ac69e99f29d27747d65940d3a1dff4ad3d9d0babcf9ae3309" } }, { "amount": 1000000000000, "target": { "key": "1a784ac2ea4a9f54335632d9d125fc4845309734106041f2cb322710d241cbf7" } }, { "amount": 2000000000000, "target": { "key": "8ef553d7ea04e5c3201a782ec556a836c8c233ced253bff4226cf6da261aceec" } }, { "amount": 10000000000000, "target": { "key": "ef1a66cef5c2b344434542f4750d1cc929d894f9eec0f4ea2ed00abf5b1072ae" } } ], "extra": [ 1, 48, 155, 63, 210, 102, 138, 45, 108, 236, 122, 17, 202, 178, 140, 22, 188, 150, 135, 226, 56, 60, 161, 225, 42, 58, 162, 132, 132, 60, 4, 35, 166 ], "signatures": [ "5a60ca05715326e86f1bb4e85c76a3109114729f24ea4c48229d1a58e592660a33a878853a35ab31e6d7ad1e6d1269bcbaf6536734744b62c0cd73782d621f08", "491f3dfe9c510fb1157c80656f7ed5fe5e0adc261ffb6629af595398b3ad0c067ccc07b4f1e3ad8f96522efabfd8cb8a7933621f009472f4239668726c2e0c02", "46b3cb9ed711acc710781b18769990c0ae0ce87f0eb4d6436628d98455358503474240c0160c2abea3c907f4bf8ae0e8ca62937ce991005c54288c49ca376101", "95a3f63866b193d8088e3bd71e59a2d3339e70caf41f92d4a5ac27846535c9040b8983d383a44b4eacd97e882c5103cf6d4fc7864acafef34897af7e81106809", "de2710caf092f96969056ec0f133227b46f37f378585e8337fe3bfe3e742ae0dd24abee31969a47891bebca11bdc57877243ed49c92229db4eee25309c923f07"] }


Less details
source code | moneroexplorer