Monero Transaction 5fd1dc8a6b4a54a35f86b8de9ac2af0b7762d05afd054b2af0195e76ebd71fce

Autorefresh is OFF

Tx hash: 5fd1dc8a6b4a54a35f86b8de9ac2af0b7762d05afd054b2af0195e76ebd71fce

Tx public key: e650041f25f2cd063a9eb77ab576a1394df908430d424ca490472a9a03bfb5dd
Payment id: 1f92de498b1b1428917cb98f3687e5a783778d3e103d8f1f09e5629674275de0

Transaction 5fd1dc8a6b4a54a35f86b8de9ac2af0b7762d05afd054b2af0195e76ebd71fce was carried out on the Monero network on 2016-12-21 22:43:05. The transaction has 2088835 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1482360185 Timestamp [UTC]: 2016-12-21 22:43:05 Age [y:d:h:m:s]: 07:349:05:02:26
Block: 1206541 Fee (per_kB): 0.010000000000 (0.009142857143) Tx size: 1.0938 kB
Tx version: 1 No of confirmations: 2088835 RingCT/type: no
Extra: 01e650041f25f2cd063a9eb77ab576a1394df908430d424ca490472a9a03bfb5dd0221001f92de498b1b1428917cb98f3687e5a783778d3e103d8f1f09e5629674275de0de2045d50c18403f3cab63a40b2cbba77bfba49137a0ca1b038dccaca2f51ef5b7df

14 output(s) for total of 8.010000000000 xmr

stealth address amount amount idx tag
00: 7c7c8ff342feb09e4a769cf1317600ecb1bcf4f23b5738a29ba4f3de796e7475 0.000002000000 34873 of 41702 -
01: 7bd41697ee9f04864e97cb0e6be6d11a85a039e8b311c5a9defe73322013a9f0 0.000008000000 35891 of 42741 -
02: 5587a17464d9a257101ca733566fed7c8d962700c6ad3247b62e64bbb0da130c 0.000010000000 52934 of 59775 -
03: 81d511dc373e40f1060f785dab1b81c7e3ba140a52a2106be4346c571fa05d25 0.000080000000 52166 of 59073 -
04: c3f43787e1ce4e7e2fc4fbbdfcecdf5ea64baf7d818377a2b7ee06edd4cd28c9 0.000200000000 69350 of 78038 -
05: 6e6728fc54316c29ea2d1557eeec858442767ca862a4d84db386cfba0bf78077 0.000700000000 68932 of 77523 -
06: 2c1520c27f1858eff4f98131efade4a7ed80a54187551c3a6607a3e121258cbb 0.002000000000 83386 of 95915 -
07: 1985c3448171f5dd0347692460b44e06815320eac6f2e7d8fba5a8a87c1b7f6b 0.007000000000 234580 of 247340 -
08: 49a6dd0bf6f3bb574b42da43d7033f257a5f083f9b416b926de84f18a647a0b6 0.010000000000 485754 of 502466 -
09: 93b57747a9014a0e7f642d5b10a565bbed5bc82efd4687d8fadf28218410343c 0.090000000000 296773 of 317822 -
10: 83deed156b74a080b6efc5453b6706a8ecbc8907b48659c4157c6bf9f1b632b5 0.300000000000 946844 of 976536 -
11: 37f19bc9674d168e70ae59c0749d5d616ee6df3b46368be7a580d2906cf64a08 0.600000000000 638592 of 650760 -
12: 324d4dc65da0fc90cfc4d94a9f0ef4f019feed1bd0992d5dbbdf2bbf9af0d373 1.000000000000 851267 of 874629 -
13: 5e015b0446a07c8ebc28e7c25e2e320c01dba6802fbe369866f0d940f0f65000 6.000000000000 201610 of 207703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 8.020000000000 xmr

key image 00: 673b6163084fcd0033bf5eb9c58eea2202c17d51cc0ea17b4e4aba8d38054a2f amount: 0.020000000000
ring members blk
- 00: 95d18f301d30a033cf85746994a6e19170675d564443eeca84f90936b52f5cb8 00053662
- 01: 56d4c7b523caeeebe107fa4436a78db0dcbe48851dc18ae649d76732e4b23aee 00080629
- 02: e7ca07e080b0578be27407411cc18d041562646bc55fb3ca41c3e72c2dc26e74 01206511
key image 01: e3bb46430a01db7a2512a313cd59e2bbff98f57783f82ce9dbc460f7587f2f13 amount: 8.000000000000
ring members blk
- 00: 52c95879e5f2bf1267ae07abc87e886f6bb1857b17d9236e842b96a4cc47af7b 00450526
- 01: 24a1e0aa90a047a5124b6af1cbef3c70b418c567781350a9bb4ab12e3e2799f5 00767114
- 02: 09cccd6002a9238ad39cc16199b202f8c9ccb5bf5315d7487d138700cf5cda7f 01206301
More details
source code | moneroexplorer