Monero Transaction b5ba178fb22d988eddc85526a1ac0e921a0c8d38a81e8da5fc3c94e0b8d30533

Autorefresh is OFF

Tx hash: b5ba178fb22d988eddc85526a1ac0e921a0c8d38a81e8da5fc3c94e0b8d30533

Tx prefix hash: 7eea3e5b80a8dfbceceb7fe430bd3915ea27d93f0b7a565fbf58da478cdb6042
Tx public key: 3002d68a417bf6e53d1b6f9d9a4114cf134e49960bf41a64953a1712ef6a9e6a

Transaction b5ba178fb22d988eddc85526a1ac0e921a0c8d38a81e8da5fc3c94e0b8d30533 was carried out on the Monero network on 2014-07-11 21:03:40. The transaction has 3117316 confirmations. Total output fee is 0.005085092087 XMR.

Timestamp: 1405112620 Timestamp [UTC]: 2014-07-11 21:03:40 Age [y:d:h:m:s]: 10:073:22:31:04
Block: 124513 Fee (per_kB): 0.005085092087 (0.008855670573) Tx size: 0.5742 kB
Tx version: 1 No of confirmations: 3117316 RingCT/type: no
Extra: 013002d68a417bf6e53d1b6f9d9a4114cf134e49960bf41a64953a1712ef6a9e6a

6 output(s) for total of 0.655000000000 xmr

stealth address amount amount idx tag
00: 78675b702cdb5991f00fd410b8305a1521e3081811a4224b06be6b233658f489 0.005000000000 186611 of 308584 -
01: 596e9ea5bd46c9988a97c47661649c90855f48096980503bd5975434506af1e8 0.050000000000 103836 of 284520 -
02: 1c867d5b4ecd4085979814821d94544ce41073a76876205354113d7d4b9ab78e 0.100000000000 266426 of 982315 -
03: c94e722449a7bf681a55ede03a0d18bc09b0f366114ce02c0b21498424ffba4b 0.100000000000 266427 of 982315 -
04: 0309ba9ebdb0f5a15fbffab24c4c60250fd10d0e31f8f058d6fd00d4906aec63 0.200000000000 180096 of 1272210 -
05: 0d2f30f89dca2f4c805a63cd6d66a646bb599a027ea3d84adef51d0bace03688 0.200000000000 180097 of 1272210 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-11 07:05:06 till 2014-07-11 13:01:38; resolution: 0.00 days)

  • |_____________________________*____________________________________________________________________________________________________________________________________________|
  • |_____________________________________________________________________________________________________________________________________________*____________________________|
  • |______________________________*___________________________________________________________________________________________________________________________________________|

3 inputs(s) for total of 0.660085092087 xmr

key image 00: abc6e0abc79f0944bf01f17491d7491f84c9548d9766ba8bb8706b06ab0bc50c amount: 0.000085092087
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f9385e02982faabe0cbddd0b1331b90219039436cce9d430d529d538fa86e31a 00123731 0 0/6 2014-07-11 08:05:06 10:074:11:29:38
key image 01: be1d92124a96f3926b5dc942f0b9639439f024914f2ef2670c6a532436c9d3f7 amount: 0.600000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6832dd7adc8fb24ef40b229cf00f21c27253b2f412e41eb1a28fbb2205a166eb 00123975 0 0/5 2014-07-11 12:01:38 10:074:07:33:06
key image 02: 43082ea4ef792f521e7deba7e0f8ebd6fd2541f507b839f1a32e4144252802bf amount: 0.060000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 01ee1a11fa697469a4e66be110f6a1f4399175f38558e6834344bf1a569e1929 00123733 0 0/6 2014-07-11 08:06:30 10:074:11:28:14
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 85092087, "key_offsets": [ 0 ], "k_image": "abc6e0abc79f0944bf01f17491d7491f84c9548d9766ba8bb8706b06ab0bc50c" } }, { "key": { "amount": 600000000000, "key_offsets": [ 73752 ], "k_image": "be1d92124a96f3926b5dc942f0b9639439f024914f2ef2670c6a532436c9d3f7" } }, { "key": { "amount": 60000000000, "key_offsets": [ 90488 ], "k_image": "43082ea4ef792f521e7deba7e0f8ebd6fd2541f507b839f1a32e4144252802bf" } } ], "vout": [ { "amount": 5000000000, "target": { "key": "78675b702cdb5991f00fd410b8305a1521e3081811a4224b06be6b233658f489" } }, { "amount": 50000000000, "target": { "key": "596e9ea5bd46c9988a97c47661649c90855f48096980503bd5975434506af1e8" } }, { "amount": 100000000000, "target": { "key": "1c867d5b4ecd4085979814821d94544ce41073a76876205354113d7d4b9ab78e" } }, { "amount": 100000000000, "target": { "key": "c94e722449a7bf681a55ede03a0d18bc09b0f366114ce02c0b21498424ffba4b" } }, { "amount": 200000000000, "target": { "key": "0309ba9ebdb0f5a15fbffab24c4c60250fd10d0e31f8f058d6fd00d4906aec63" } }, { "amount": 200000000000, "target": { "key": "0d2f30f89dca2f4c805a63cd6d66a646bb599a027ea3d84adef51d0bace03688" } } ], "extra": [ 1, 48, 2, 214, 138, 65, 123, 246, 229, 61, 27, 111, 157, 154, 65, 20, 207, 19, 78, 73, 150, 11, 244, 26, 100, 149, 58, 23, 18, 239, 106, 158, 106 ], "signatures": [ "895cbcfbca1a91e671292b9c2e954f61c652d748147b3732fa48cddb1b48f40abdc167ce10fbcae048b1fe31c0c8be691139f2c0bce1c4def8c3ccb61b48660d", "91b1ee7cacc011ad088974a63192e8fd8b74a0e479d3a3ed89adfa4e4c1a100e3496ef46bfd236c2d892db290474b48be45a8a7d98babbcb4229be9a3a3dbe0f", "42f44a9fbfeaaaddd21140ec786f0844eab6b746e494da6fb1caa49d6fd13d02d7ab055bf2123735bcf179f30fae68ea2807cdcf4bc9b37868d8ab67e95fde0c"] }


Less details
source code | moneroexplorer