Monero Transaction bb5e6e3f55b49b90adca9682df399520943153c8dcc4b2d9d1cb68bfc1d3efce

Autorefresh is OFF

Tx hash: bb5e6e3f55b49b90adca9682df399520943153c8dcc4b2d9d1cb68bfc1d3efce

Tx prefix hash: f5183ed65427ab8b1f9b6b37e8320feb3f8a1f1a2bf39a498c3c043c0c34772c
Tx public key: 250fdd26ace59ea0bbd84816de851e8b4e28fc7d2ffcc86ea2ea7406113f23b4

Transaction bb5e6e3f55b49b90adca9682df399520943153c8dcc4b2d9d1cb68bfc1d3efce was carried out on the Monero network on 2014-05-29 15:09:24. The transaction has 3216456 confirmations. Total output fee is 0.005880278616 XMR.

Timestamp: 1401376164 Timestamp [UTC]: 2014-05-29 15:09:24 Age [y:d:h:m:s]: 10:167:21:47:10
Block: 61886 Fee (per_kB): 0.005880278616 (0.012650011140) Tx size: 0.4648 kB
Tx version: 1 No of confirmations: 3216456 RingCT/type: no
Extra: 01250fdd26ace59ea0bbd84816de851e8b4e28fc7d2ffcc86ea2ea7406113f23b4

6 output(s) for total of 0.055056768013 xmr

stealth address amount amount idx tag
00: 8b7e8bdb9300e778760d0ca0840b0767a1416807891c6b148535459327b24250 0.000365260637 0 of 1 -
01: 8d217d5ec314dfbf6409f84b5909807211e89725efc85287f6ec258e6aab6cee 0.000691507376 0 of 1 -
02: c0693eedd2c064827a139686a7c204f4b5deafe73e075f4665e4a55c59639cfc 0.007000000000 26500 of 247340 -
03: 2758fc486c8bfbd3968f174929907f9e19a1f32b4d25963579c77f4b56160061 0.007000000000 26501 of 247340 -
04: e100ef23038e22733346f7ad4f4b218db7cc4bc2944a1b0b694697ada7b1dc58 0.010000000000 50318 of 502466 -
05: e764e0088552b0f4c19da9fb0dd62d8f2c895572258290db9f87744fb8bc900f 0.030000000000 22777 of 324336 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-29 11:32:41 till 2014-05-29 14:54:48; resolution: 0.00 days)

  • |___________________________________________________*______________________________________________________________________________________________________________________|
  • |_______________________________________________________________________________________________________________________*__________________________________________________|

2 inputs(s) for total of 0.060937046629 xmr

key image 00: 6adf1fe7eb97b8ef2226a634b7d031951df49b059a8aef9b74447d95a2cd7a6e amount: 0.000937046629
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 72bddfa57eadd2144218949cca671b51859be5aa198a95c11993dacc7a790b88 00061748 0 0/5 2014-05-29 12:32:41 10:168:00:23:53
key image 01: 66506ffb5a934624b7c1fe704f634809da0f33f084dac131ba61cb4240360a5f amount: 0.060000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4cac3d3b6d90ab69759b9bac29550d1708550bc3a42b2a215631fb347c2a6cd4 00061820 1 11/99 2014-05-29 13:54:48 10:167:23:01:46
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 937046629, "key_offsets": [ 0 ], "k_image": "6adf1fe7eb97b8ef2226a634b7d031951df49b059a8aef9b74447d95a2cd7a6e" } }, { "key": { "amount": 60000000000, "key_offsets": [ 14638 ], "k_image": "66506ffb5a934624b7c1fe704f634809da0f33f084dac131ba61cb4240360a5f" } } ], "vout": [ { "amount": 365260637, "target": { "key": "8b7e8bdb9300e778760d0ca0840b0767a1416807891c6b148535459327b24250" } }, { "amount": 691507376, "target": { "key": "8d217d5ec314dfbf6409f84b5909807211e89725efc85287f6ec258e6aab6cee" } }, { "amount": 7000000000, "target": { "key": "c0693eedd2c064827a139686a7c204f4b5deafe73e075f4665e4a55c59639cfc" } }, { "amount": 7000000000, "target": { "key": "2758fc486c8bfbd3968f174929907f9e19a1f32b4d25963579c77f4b56160061" } }, { "amount": 10000000000, "target": { "key": "e100ef23038e22733346f7ad4f4b218db7cc4bc2944a1b0b694697ada7b1dc58" } }, { "amount": 30000000000, "target": { "key": "e764e0088552b0f4c19da9fb0dd62d8f2c895572258290db9f87744fb8bc900f" } } ], "extra": [ 1, 37, 15, 221, 38, 172, 229, 158, 160, 187, 216, 72, 22, 222, 133, 30, 139, 78, 40, 252, 125, 47, 252, 200, 110, 162, 234, 116, 6, 17, 63, 35, 180 ], "signatures": [ "ddf3fd5ba879ebd0cf3754c0089a6c7cdfee1b1a7293996912048cdec118d904d224a4560649a8c7fb52a278625e6cbd8910b3ba7a6b1d43bd26ea711f75ab0d", "840833a7124b46795f768ad8f4cf65080412e11a5a7d6fcb0b664dbff2cdc60acdcf2172ff9d08aebce47b1e1907ed98d04d5905992865613aed873f3685bd05"] }


Less details
source code | moneroexplorer