Monero Transaction b50cf7113b1979ef66c4554cdb31a8993bf432ac73d0082023181b163d126b34

Autorefresh is OFF

Tx hash: b50cf7113b1979ef66c4554cdb31a8993bf432ac73d0082023181b163d126b34

Tx prefix hash: fa5ec4cb953482b0c9a2de02c0f8eceac2ae4ea64156362ccef04a7d8431b957
Tx public key: a44938b29552a11eaae740a73ba3b98eb874a3095929d8a2e63beead69437f98
Payment id: c7e26ce2cf071d8b8ca75ab4114fa7952e21ff211492bf28d015681b37b8b471

Transaction b50cf7113b1979ef66c4554cdb31a8993bf432ac73d0082023181b163d126b34 was carried out on the Monero network on 2014-12-06 07:53:27. The transaction has 2964903 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1417852407 Timestamp [UTC]: 2014-12-06 07:53:27 Age [y:d:h:m:s]: 10:008:08:14:05
Block: 335794 Fee (per_kB): 0.010000000000 (0.017297297297) Tx size: 0.5781 kB
Tx version: 1 No of confirmations: 2964903 RingCT/type: no
Extra: 022100c7e26ce2cf071d8b8ca75ab4114fa7952e21ff211492bf28d015681b37b8b47101a44938b29552a11eaae740a73ba3b98eb874a3095929d8a2e63beead69437f98

5 output(s) for total of 31.390000000000 xmr

stealth address amount amount idx tag
00: c85a541229ab59c8683d24433cd968bc27119b9ad9ef554ee699a2c9603fe9e2 0.090000000000 125580 of 317822 -
01: dea4f8201e7eba0e05d3d91451cfc3c93e6f12f3d2892e65161bc2a845596982 0.300000000000 364880 of 976536 -
02: 3167c8ab5af3e91cfd11a19fbeca9dab43484332cb50146f7ca46470aad77a48 5.000000000000 130707 of 255089 -
03: 21a7e9f706c110a31b0d62b0a0448e097f117a3991e3d8a543e78ea354bdc93f 6.000000000000 91508 of 207703 -
04: ee5b0e80aec23001b8f1a6e847a58e278660faaf2c5e47b38519888a0f8bb7ae 20.000000000000 22681 of 78991 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-12-05 22:31:05 till 2014-12-06 07:41:20; resolution: 0.00 days)

  • |___________________*______________________________________________________________________________________________________________________________________________________|
  • |_______________________________________________________________________________________________________________________________________________________*__________________|
  • |_________________________________________________________________*________________________________________________________________________________________________________|

3 inputs(s) for total of 31.400000000000 xmr

key image 00: 31295b25df7d12d6409299e412de050446d2fa6cdbdc9a813a89bc89d4d30552 amount: 0.700000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3108e6f5bf2fc640e07fb45fc55bc32e7109d82ce3535729ec39a971545b40e2 00335238 1 4/4 2014-12-05 23:31:05 10:008:16:36:27
key image 01: 98c56924e7165d3129b71679acce5677d3422df3bde8a0fb052f6a27d0e17f61 amount: 0.700000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d47b725a53ea9dd637280fa1f6f232dbfb29c004f01bdce57cf8aa7a6f2da183 00335695 1 4/3 2014-12-06 06:41:20 10:008:09:26:12
key image 02: d227e8dd4e4531816a2b73ec87c17b4bbe492cd7800b701c6ae962f2f537262b amount: 30.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 200369cc9d3d6053b12d1183fc30d4c94bfbfd038769fdd7616153529277b18f 00335356 1 12/57 2014-12-06 01:59:52 10:008:14:07:40
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 700000000000, "key_offsets": [ 216009 ], "k_image": "31295b25df7d12d6409299e412de050446d2fa6cdbdc9a813a89bc89d4d30552" } }, { "key": { "amount": 700000000000, "key_offsets": [ 216167 ], "k_image": "98c56924e7165d3129b71679acce5677d3422df3bde8a0fb052f6a27d0e17f61" } }, { "key": { "amount": 30000000000000, "key_offsets": [ 12009 ], "k_image": "d227e8dd4e4531816a2b73ec87c17b4bbe492cd7800b701c6ae962f2f537262b" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "c85a541229ab59c8683d24433cd968bc27119b9ad9ef554ee699a2c9603fe9e2" } }, { "amount": 300000000000, "target": { "key": "dea4f8201e7eba0e05d3d91451cfc3c93e6f12f3d2892e65161bc2a845596982" } }, { "amount": 5000000000000, "target": { "key": "3167c8ab5af3e91cfd11a19fbeca9dab43484332cb50146f7ca46470aad77a48" } }, { "amount": 6000000000000, "target": { "key": "21a7e9f706c110a31b0d62b0a0448e097f117a3991e3d8a543e78ea354bdc93f" } }, { "amount": 20000000000000, "target": { "key": "ee5b0e80aec23001b8f1a6e847a58e278660faaf2c5e47b38519888a0f8bb7ae" } } ], "extra": [ 2, 33, 0, 199, 226, 108, 226, 207, 7, 29, 139, 140, 167, 90, 180, 17, 79, 167, 149, 46, 33, 255, 33, 20, 146, 191, 40, 208, 21, 104, 27, 55, 184, 180, 113, 1, 164, 73, 56, 178, 149, 82, 161, 30, 170, 231, 64, 167, 59, 163, 185, 142, 184, 116, 163, 9, 89, 41, 216, 162, 230, 59, 238, 173, 105, 67, 127, 152 ], "signatures": [ "46abda83ff0e3bff429eb3c83667050a8082cb25f1b413ca6cbf6f81ff90610c0b181dc801f9a067ec4bcc971e4f2b3c023664b5262fc02bf25e5da973f8f60b", "1bfc49dbf72be147ca8ea6e492a6edfa5238aed9482778b0cef851b2f9a4da055c120989a2c4915b20c375f83cf399b03631ad7bb3fd68b184fb9d8e99f52d0d", "3e0d86ae29534f511a2791b00b67b2eade4b74302be6038274844a6a8611ef0dacb037cc15d255ab554918753c82cef383f90b1ee4dd6e2304444bf3b0a1540b"] }


Less details
source code | moneroexplorer