Monero Transaction d53397e8125132ffd6489479606a4e7e553b0903a80087e08002b0c986c9dea2

Autorefresh is OFF

Tx hash: d53397e8125132ffd6489479606a4e7e553b0903a80087e08002b0c986c9dea2

Tx prefix hash: 2c5bc645b557f28bae4bf9c58a4dddae7b04b90b42e856473959994e6fff529a
Tx public key: 54f0c6079f31b4d6efe2cce9437c9a0e7607314d3abefd4e5ed102391858f938
Payment id: 0bfbd6de22568ee54ced70dc81d14356b35a668a6422470d4d1a22268e592a3d

Transaction d53397e8125132ffd6489479606a4e7e553b0903a80087e08002b0c986c9dea2 was carried out on the Monero network on 2014-08-12 09:15:25. The transaction has 3131499 confirmations. Total output fee is 0.005659990000 XMR.

Timestamp: 1407834925 Timestamp [UTC]: 2014-08-12 09:15:25 Age [y:d:h:m:s]: 10:125:06:51:59
Block: 169942 Fee (per_kB): 0.005659990000 (0.005583651021) Tx size: 1.0137 kB
Tx version: 1 No of confirmations: 3131499 RingCT/type: no
Extra: 0221000bfbd6de22568ee54ced70dc81d14356b35a668a6422470d4d1a22268e592a3d0154f0c6079f31b4d6efe2cce9437c9a0e7607314d3abefd4e5ed102391858f938

7 output(s) for total of 5.194340010000 xmr

stealth address amount amount idx tag
00: 3fb5f332098bef9835371b6b420e06b473be5ee6a6e17168dbd85885d12de681 0.000340010000 0 of 1 -
01: 1188e8ecb3e012102807acc1a8fecb6b5ca1fb60ac4ab4d59ba6b8572f949a08 0.005000000000 209045 of 308585 -
02: 8f3e75ea91d61dd586e8e4b783176ec35c9ece6f78f3fc0aa7214001e645863d 0.009000000000 160752 of 233398 -
03: 150ff170d14a1976d2f8d8d1899a20c8f58fe4c30309ce1d0e24c146209de81d 0.010000000000 330244 of 502466 -
04: 03666527739512b51a32a6eb14f51914fdeb60e9c2c7e61e234114269e83655a 0.070000000000 95239 of 263947 -
05: 88ea1067b425e350e3eaacd8bdaa0a0cde3f51528459217b8aed871cb41d362a 0.100000000000 410344 of 982315 -
06: 4ea29bf90ffcce8794c6730ec018c8fcf4503c3dd2704a22bf9a20a71b0d4b47 5.000000000000 102450 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-16 11:32:00 till 2014-08-12 08:10:38; resolution: 0.33 days)

  • |________________________________*________________________________________________________________________________________________________________________________________*|
  • |___________________________________________________________________________________________________*_____________________________________________________________________*|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |___________________________________________________________________________________________________________________________*_____________________________________________*|

4 inputs(s) for total of 5.200000000000 xmr

key image 00: 24457c577b161cd10728b85b2fd4400cae6a8d5c632fb929824f3932217a2d4b amount: 0.300000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: adcfc7791345a26adfdbb95f1591b61687b275dc26c6c7bd4bd9afab113c9ff1 00103375 1 6/35 2014-06-27 05:21:14 10:171:10:46:10
- 01: ea8fd0335b766344b2b72397d0b7e17eb55dd95a099d17d2795ac1348c085eda 00169725 2 1/43 2014-08-12 06:00:48 10:125:10:06:36
key image 01: 5dbf82bbd13675b71458e73c96009b7695c451842d5f22317e3ee707eb435b53 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0028052a8ec3cd3e8375ee1cffb4c088d446ec48ecf9e6b9560dce00ca1416ba 00135575 1 16/61 2014-07-19 12:19:07 10:149:03:48:17
- 01: 9a45801474af43b87c838a9360f2936b7bf648379b573b7b4ca219508cdd107b 00169796 2 3/8 2014-08-12 07:10:38 10:125:08:56:46
key image 02: 354906cf8275f397e7c97913731ac0e662f660bf0e711f22e28d00705d12211c amount: 0.700000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6f673b5ead37b37bf18a43d3d8f00df88d019f8ba724e03881cd5d7c097b9480 00087884 1 6/12 2014-06-16 12:32:00 10:182:03:35:24
- 01: d51c95c5afad4aba22ab8c4a78ae535d97a4a0330fcd508ac76faee11a6e6e34 00169540 2 2/9 2014-08-12 03:00:00 10:125:13:07:24
key image 03: c392431fc38bd3e301e5ec9b91ad87430d915cb1623cf949a6a9760c7d58f3ed amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6e157c7b3800392701d76a546f52edd175ba6b69f4d8f9d058d12c857ee74846 00147539 1 9/61 2014-07-27 19:42:14 10:140:20:25:10
- 01: 2f137985ceb65b8e9f8d7d969d666d392181b4bae11d423d4e33410948e958c7 00169559 0 0/6 2014-08-12 03:29:41 10:125:12:37:43
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 300000000000, "key_offsets": [ 63796, 94086 ], "k_image": "24457c577b161cd10728b85b2fd4400cae6a8d5c632fb929824f3932217a2d4b" } }, { "key": { "amount": 200000000000, "key_offsets": [ 221526, 131237 ], "k_image": "5dbf82bbd13675b71458e73c96009b7695c451842d5f22317e3ee707eb435b53" } }, { "key": { "amount": 700000000000, "key_offsets": [ 20170, 84820 ], "k_image": "354906cf8275f397e7c97913731ac0e662f660bf0e711f22e28d00705d12211c" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 28682, 7185 ], "k_image": "c392431fc38bd3e301e5ec9b91ad87430d915cb1623cf949a6a9760c7d58f3ed" } } ], "vout": [ { "amount": 340010000, "target": { "key": "3fb5f332098bef9835371b6b420e06b473be5ee6a6e17168dbd85885d12de681" } }, { "amount": 5000000000, "target": { "key": "1188e8ecb3e012102807acc1a8fecb6b5ca1fb60ac4ab4d59ba6b8572f949a08" } }, { "amount": 9000000000, "target": { "key": "8f3e75ea91d61dd586e8e4b783176ec35c9ece6f78f3fc0aa7214001e645863d" } }, { "amount": 10000000000, "target": { "key": "150ff170d14a1976d2f8d8d1899a20c8f58fe4c30309ce1d0e24c146209de81d" } }, { "amount": 70000000000, "target": { "key": "03666527739512b51a32a6eb14f51914fdeb60e9c2c7e61e234114269e83655a" } }, { "amount": 100000000000, "target": { "key": "88ea1067b425e350e3eaacd8bdaa0a0cde3f51528459217b8aed871cb41d362a" } }, { "amount": 5000000000000, "target": { "key": "4ea29bf90ffcce8794c6730ec018c8fcf4503c3dd2704a22bf9a20a71b0d4b47" } } ], "extra": [ 2, 33, 0, 11, 251, 214, 222, 34, 86, 142, 229, 76, 237, 112, 220, 129, 209, 67, 86, 179, 90, 102, 138, 100, 34, 71, 13, 77, 26, 34, 38, 142, 89, 42, 61, 1, 84, 240, 198, 7, 159, 49, 180, 214, 239, 226, 204, 233, 67, 124, 154, 14, 118, 7, 49, 77, 58, 190, 253, 78, 94, 209, 2, 57, 24, 88, 249, 56 ], "signatures": [ "25fa7335b4ef0c36e7bd37484c6ede0be451d471364b7b94388ca5bee5b34f07cec4c1f04bb36f398afb49ed7092a48f2ebb37fbc33ae155ef2cf2cdf676da0273358119bbbaad4169bc1258504b9ac8961252863d7d6591041e767b77b3ff0e7d50061011b5b1f9dc2c02908c76b7a15d4ddbc2db56a2dd8457e8a80131dc06", "f35b124b8b0f8d20e5342a2ec0088a380930ed3e283b5ba919642902589c250278269aac08bd5c9f0da0029797d2adbf6afabef6de87b866c4a24cef95a0330f652121073fe84637aff8cc53bcc8d61cec6f16fb9c3311241dc6517559277c0b3eb9dcb27ea453d13605fac6f46b08622d257af3ffe232e1e5a8e573fe7a3104", "e7e58d563b2459ede205be8334b4efcf2be896645d97f1198003026c18c2640e9c9cd40650734049cea12290753affab868ae7fce5bfd5c3de2772b78011000d8c02679b4c369d0a8c31c9f1e404a09d03546a0eaf2424d862af7a5c8181d808ff691f969499339e9a180aa1ec896f6591073204da1d33c0c55afd07159c8800", "8b580597f1f5372a2467a1b2481c10a9a209dee0f5f4f42a89a0e1949f2f860adcc746e635d4e19db3c6bac20168a78f5fd5a052fb4f9f7bb3240714663b7408507cfd1e8a1e4f4c96aa7c84a4d262efb582e0b3379816c72b5a942bc2e6a40facd7264420ad681082693087e04dbef59e475118653745e4f45e8ff510a3d003"] }


Less details
source code | moneroexplorer