Monero Transaction d50f5804d062791f853d6b82ef17ae3eb53e2090c030e82e5dfe36816cd513db

Autorefresh is OFF

Tx hash: d50f5804d062791f853d6b82ef17ae3eb53e2090c030e82e5dfe36816cd513db

Tx prefix hash: a22fb71acb8fbe09596940a66f3be2736c6c8d3f15acbfe8127bdd7c899d68bc
Tx public key: 3bdaed0b5866c7a61111ecc0665ddf63c76b8cbe594cc70d5611111b18b364fa
Payment id: 72bf105e2b554aca8bdf4a0e55dc669e0977bd73338247228e8a9b9f70e1af0f

Transaction d50f5804d062791f853d6b82ef17ae3eb53e2090c030e82e5dfe36816cd513db was carried out on the Monero network on 2014-11-20 16:37:06. The transaction has 2995434 confirmations. Total output fee is 0.149984540000 XMR.

Timestamp: 1416501426 Timestamp [UTC]: 2014-11-20 16:37:06 Age [y:d:h:m:s]: 10:035:06:24:07
Block: 313431 Fee (per_kB): 0.149984540000 (0.229916420599) Tx size: 0.6523 kB
Tx version: 1 No of confirmations: 2995434 RingCT/type: no
Extra: 02210072bf105e2b554aca8bdf4a0e55dc669e0977bd73338247228e8a9b9f70e1af0f013bdaed0b5866c7a61111ecc0665ddf63c76b8cbe594cc70d5611111b18b364fa

7 output(s) for total of 300.253300230000 xmr

stealth address amount amount idx tag
00: a9e2f79e23fe933499167fc1bd8b3827a1e99cfc9fd3e8ecf58e5e19cd6fe6de 0.053300230000 0 of 1 -
01: 55b18f69c9130dbdbaee64d52f19368a325ddc2e54b15c39144d741f611d5b04 0.200000000000 630406 of 1272211 -
02: 40c3e4db9c140ed99a80d487cbf65448d8b57af2d9fff840ca4c9d6f7858ca96 4.000000000000 132298 of 237197 -
03: 25410a636f0f154b69c79fcb584d03d0c034e50a34eb88a734eed6e8f14e47bc 6.000000000000 89296 of 207703 -
04: b9f1c298f243a5574687a9dd3db69319f8d184ffbc5002636f99d849ec9c7d70 40.000000000000 7910 of 41682 -
05: 71400701e75f5d7c85ed8a6ac6b33e8299e76892dc56676998004ed4f9e7a399 50.000000000000 8829 of 44703 -
06: 48c2d44750b11e5e7be21b9104c315909af950834054c12ccd2a6227dfe30a68 200.000000000000 3732 of 31883 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-08-07 09:34:50 till 2014-11-20 12:13:56; resolution: 0.62 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |________________________________________________________________________________________________________________________________________________________________________*_|

3 inputs(s) for total of 300.403284770000 xmr

key image 00: 5e137faedf3e7eb8f13c068d851d874885f84f0f66368b3bcae14fa8848692da amount: 0.003284770000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 63374c57b8a2f81224b7023bb40670a7d54a5c6e72530b223f57d22e83a2b98c 00162826 2 2/6 2014-08-07 10:34:50 10:140:12:26:23
key image 01: 2954c02c8efc907012738440e666cb994bc0d30b0eeb0dfedaa1d143ec0cb1df amount: 0.400000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f125f130cfad24eb4c43f555977baae61bd7ce82321551042fbf4971839e4748 00313100 1 1/4 2014-11-20 11:13:56 10:035:11:47:17
key image 02: 6b40ce70ae0cc8459ab41c1b240f1cdd442196663986c3f15beeb834fe7628de amount: 300.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4f18b3d9c3e17c59b1275eb434d630aeacc113b85d59ab71e22063c4c4551c17 00311955 1 6/8 2014-11-19 15:35:36 10:036:07:25:37
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 3284770000, "key_offsets": [ 0 ], "k_image": "5e137faedf3e7eb8f13c068d851d874885f84f0f66368b3bcae14fa8848692da" } }, { "key": { "amount": 400000000000, "key_offsets": [ 281123 ], "k_image": "2954c02c8efc907012738440e666cb994bc0d30b0eeb0dfedaa1d143ec0cb1df" } }, { "key": { "amount": 300000000000000, "key_offsets": [ 1624 ], "k_image": "6b40ce70ae0cc8459ab41c1b240f1cdd442196663986c3f15beeb834fe7628de" } } ], "vout": [ { "amount": 53300230000, "target": { "key": "a9e2f79e23fe933499167fc1bd8b3827a1e99cfc9fd3e8ecf58e5e19cd6fe6de" } }, { "amount": 200000000000, "target": { "key": "55b18f69c9130dbdbaee64d52f19368a325ddc2e54b15c39144d741f611d5b04" } }, { "amount": 4000000000000, "target": { "key": "40c3e4db9c140ed99a80d487cbf65448d8b57af2d9fff840ca4c9d6f7858ca96" } }, { "amount": 6000000000000, "target": { "key": "25410a636f0f154b69c79fcb584d03d0c034e50a34eb88a734eed6e8f14e47bc" } }, { "amount": 40000000000000, "target": { "key": "b9f1c298f243a5574687a9dd3db69319f8d184ffbc5002636f99d849ec9c7d70" } }, { "amount": 50000000000000, "target": { "key": "71400701e75f5d7c85ed8a6ac6b33e8299e76892dc56676998004ed4f9e7a399" } }, { "amount": 200000000000000, "target": { "key": "48c2d44750b11e5e7be21b9104c315909af950834054c12ccd2a6227dfe30a68" } } ], "extra": [ 2, 33, 0, 114, 191, 16, 94, 43, 85, 74, 202, 139, 223, 74, 14, 85, 220, 102, 158, 9, 119, 189, 115, 51, 130, 71, 34, 142, 138, 155, 159, 112, 225, 175, 15, 1, 59, 218, 237, 11, 88, 102, 199, 166, 17, 17, 236, 192, 102, 93, 223, 99, 199, 107, 140, 190, 89, 76, 199, 13, 86, 17, 17, 27, 24, 179, 100, 250 ], "signatures": [ "0250fc064d04f9e873eaa1c14d0ed694961dc66a1a065c0ec7d5b87483c7070893edd47e3f25659d320def241dd500a2e0dffc5fd3e98dca809e903f31c37e09", "de1e32934ad1d02d2802b99ca154295023bfce2661d188c055cea77bb008be0883a722ca8354265cd4fa257dd974ae88b0d68ea11a9b7f5681888602dc4a2b05", "6fda2f30a7a6d9085fbe9bc5ff976a174cfaebfdca00fb8e3e19cad29b539a0d899cdd0495d9b0e3f4fa00bbd25830390d39e5f08deec1f64ae01e2e7ac6a400"] }


Less details
source code | moneroexplorer