Monero Transaction b5dacc14b65882b90a140158430b48322bb5a7592e861aa5d96143fca10acd28

Autorefresh is OFF

Tx hash: b5dacc14b65882b90a140158430b48322bb5a7592e861aa5d96143fca10acd28

Tx prefix hash: 39e9fb12931fcd1ec4261101bde838d8b9bde5a8356b66caf451b8a1f285c152
Tx public key: fd5f5146116478f7bef94c1d8b8a5a87f9c4cf9b80e3d6760dc67279b6f98ddc

Transaction b5dacc14b65882b90a140158430b48322bb5a7592e861aa5d96143fca10acd28 was carried out on the Monero network on 2014-07-28 22:32:01. The transaction has 3129177 confirmations. Total output fee is 0.007592902553 XMR.

Timestamp: 1406586721 Timestamp [UTC]: 2014-07-28 22:32:01 Age [y:d:h:m:s]: 10:107:14:09:32
Block: 149156 Fee (per_kB): 0.007592902553 (0.008090668277) Tx size: 0.9385 kB
Tx version: 1 No of confirmations: 3129177 RingCT/type: no
Extra: 01fd5f5146116478f7bef94c1d8b8a5a87f9c4cf9b80e3d6760dc67279b6f98ddc

10 output(s) for total of 20.010000000000 xmr

stealth address amount amount idx tag
00: 5b46dc2a49805a422482acbeb27d5939f123d385e4e88573e66b598dc11a3ea5 0.010000000000 319903 of 502466 -
01: bd38d87ccfba285df0cfb46e7f98f7206e0c7cc58adbb6726782dbc4af1e7321 0.100000000000 332280 of 982315 -
02: e79ee8f5d010160627154ef3470108708e27d49ee6e03bde21af2d9822fc8072 0.300000000000 131238 of 976536 -
03: fdb278bde93d1e3f6d45564c3d27a7fed19e92eaa084e91b22ac9b700a7c429a 0.400000000000 119791 of 688584 -
04: a0d0d28a3349082b1b563a05ad701cf9dee8f73cf3207b0013d9518622681197 0.400000000000 119792 of 688584 -
05: e9e7cef9fdc20696e1a70de20ec8cfc09941bfc9e7fef95fea54c70dd1490366 0.800000000000 88032 of 489955 -
06: 7778b32e57bb41b2eb0e374bd5b7552b4e5886f487997b25cfe079b01751d9c9 2.000000000000 57169 of 434057 -
07: 08ca8824ca03cf74fbb1ed1fe81051be65b2598afc4c8cf60d6370e07f4ff9ea 2.000000000000 57170 of 434057 -
08: 9d83e9b5dd2fb9c037f6f35db050059c40dded7d31181547cf64e1d9d926436a 6.000000000000 72119 of 207703 -
09: 317a552001bc35e314fad94e00f5d338954b2d0b91293054dc5ea2cac65f977f 8.000000000000 11450 of 226902 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-27 13:40:35 till 2014-07-28 23:00:39; resolution: 0.01 days)

  • |______*___________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________*________|
  • |_________________________________________________________________________________________________________________________________________________________________*________|
  • |____________________________________________________________________________________________________________________________________________________________________*_____|
  • |________________________________________________________________________________________________________________________________________________________________*_________|

5 inputs(s) for total of 20.017592902553 xmr

key image 00: 20adcae323a8efc0ab3cc88876777ce886ddb13e3c7f731c0cf9b3db394b21a6 amount: 0.000592902553
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c6c82209342ee724a788822afe0fc786eb69a3afa014233f337fa2c4e400ec18 00147303 0 0/5 2014-07-27 14:40:35 10:108:22:00:58
key image 01: e4cf81d7d4ba340e61d2203f91825d5a151aaec30f6dc87f8ae1a5b85d1d1574 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: be78c8bd5dda85c1af3ff5a51be001ad5ed67133af4ad42eda2ed97deaa68b93 00149079 0 0/6 2014-07-28 21:14:32 10:107:15:27:01
key image 02: 9694140b700331bc39aca371e6cf44b5727e42446bad62858a0b41349d014496 amount: 0.009000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 2fe46afdc3193ec03343d02e199fbd558e1e771092fe531a2a5a28f9befd3238 00149079 0 0/6 2014-07-28 21:14:32 10:107:15:27:01
key image 03: 2e4300011499a3eeb69466379126d429460701a56bef03503c8d3757b25732e9 amount: 0.008000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5521446f0930c4fee6839e69b9b32793e05a0d38414b57c702e5e78165ddc8be 00149130 1 5/12 2014-07-28 22:00:39 10:107:14:40:54
key image 04: e2e9c1cb42711a4b770f94cfcd41569dc553c94e65614e2a05245d90071df597 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8f7f73b14a5cd9d8c9ae784d537f3382f5254f78106fccf0b14d34542167fc80 00149076 0 0/6 2014-07-28 21:13:07 10:107:15:28:26
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 592902553, "key_offsets": [ 0 ], "k_image": "20adcae323a8efc0ab3cc88876777ce886ddb13e3c7f731c0cf9b3db394b21a6" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 170409 ], "k_image": "e4cf81d7d4ba340e61d2203f91825d5a151aaec30f6dc87f8ae1a5b85d1d1574" } }, { "key": { "amount": 9000000000, "key_offsets": [ 153930 ], "k_image": "9694140b700331bc39aca371e6cf44b5727e42446bad62858a0b41349d014496" } }, { "key": { "amount": 8000000000, "key_offsets": [ 159438 ], "k_image": "2e4300011499a3eeb69466379126d429460701a56bef03503c8d3757b25732e9" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 170406 ], "k_image": "e2e9c1cb42711a4b770f94cfcd41569dc553c94e65614e2a05245d90071df597" } } ], "vout": [ { "amount": 10000000000, "target": { "key": "5b46dc2a49805a422482acbeb27d5939f123d385e4e88573e66b598dc11a3ea5" } }, { "amount": 100000000000, "target": { "key": "bd38d87ccfba285df0cfb46e7f98f7206e0c7cc58adbb6726782dbc4af1e7321" } }, { "amount": 300000000000, "target": { "key": "e79ee8f5d010160627154ef3470108708e27d49ee6e03bde21af2d9822fc8072" } }, { "amount": 400000000000, "target": { "key": "fdb278bde93d1e3f6d45564c3d27a7fed19e92eaa084e91b22ac9b700a7c429a" } }, { "amount": 400000000000, "target": { "key": "a0d0d28a3349082b1b563a05ad701cf9dee8f73cf3207b0013d9518622681197" } }, { "amount": 800000000000, "target": { "key": "e9e7cef9fdc20696e1a70de20ec8cfc09941bfc9e7fef95fea54c70dd1490366" } }, { "amount": 2000000000000, "target": { "key": "7778b32e57bb41b2eb0e374bd5b7552b4e5886f487997b25cfe079b01751d9c9" } }, { "amount": 2000000000000, "target": { "key": "08ca8824ca03cf74fbb1ed1fe81051be65b2598afc4c8cf60d6370e07f4ff9ea" } }, { "amount": 6000000000000, "target": { "key": "9d83e9b5dd2fb9c037f6f35db050059c40dded7d31181547cf64e1d9d926436a" } }, { "amount": 8000000000000, "target": { "key": "317a552001bc35e314fad94e00f5d338954b2d0b91293054dc5ea2cac65f977f" } } ], "extra": [ 1, 253, 95, 81, 70, 17, 100, 120, 247, 190, 249, 76, 29, 139, 138, 90, 135, 249, 196, 207, 155, 128, 227, 214, 118, 13, 198, 114, 121, 182, 249, 141, 220 ], "signatures": [ "d2bf81f5221e31e1fe04f5dce4d94e07386b289c3b52e0fe79137dca6dede2024bb815505df98ac35d2e7b7a069430b0321f96b300e55c33be826f13ad44e309", "65b45fe7323c7a9b2c62733028961c19bc68826d59e9170895b05271bf8dfd033925164e5246d9b24aa2b408632af857feb57a5d5ec0d22f03d28365daa54b08", "3ce5fe6cc641b90b97b6e13521f6bea2be961350fc7cb982c1eb705e15770705be8655a5bec123ce1c5169c3a842c5c3da387e70ebc9a798ae7c1c713a5f3e05", "4214b37d15847e34b665ce8347a7bf77b69382f57dd5b3cc794aeeb3420d9d073ac130415d4ddd7b4e2b523b9589dbececdddcd02bb1612dd0a84ce5593f5a00", "d7df46fe26514f5457b699ca0447624ef62255713b70fb3c8cfc5ed9f8e6a303320a462e6cd04ddb6fe367aa74a393d6e81f58d0b739742785173f0e609dcd0f"] }


Less details
source code | moneroexplorer