Monero Transaction ded5b0258ab9b483b2f0ceaff080111f309fae04518081ee90d2e85cc29163b7

Autorefresh is OFF

Tx hash: ded5b0258ab9b483b2f0ceaff080111f309fae04518081ee90d2e85cc29163b7

Tx prefix hash: 1d64d2015444584e831a2bdd9a58578e4607191ebbde7908e5585b7c5137e824
Tx public key: fa37a1202530135beba697b8d20ae59c8330d0834b3d7b4cc63170b893370883
Payment id: 43a3ea2e9f6f40faa6e69045c2b251faf1a3c82a2a14435d85fd5a179dbc1428

Transaction ded5b0258ab9b483b2f0ceaff080111f309fae04518081ee90d2e85cc29163b7 was carried out on the Monero network on 2014-07-28 10:49:04. The transaction has 3093057 confirmations. Total output fee is 0.005840160000 XMR.

Timestamp: 1406544544 Timestamp [UTC]: 2014-07-28 10:49:04 Age [y:d:h:m:s]: 10:056:22:55:08
Block: 148486 Fee (per_kB): 0.005840160000 (0.008629615931) Tx size: 0.6768 kB
Tx version: 1 No of confirmations: 3093057 RingCT/type: no
Extra: 02210043a3ea2e9f6f40faa6e69045c2b251faf1a3c82a2a14435d85fd5a179dbc142801fa37a1202530135beba697b8d20ae59c8330d0834b3d7b4cc63170b893370883

7 output(s) for total of 5.994159840000 xmr

stealth address amount amount idx tag
00: 70ec904dcc5a697505bb94fc39d9a2230b50a640088b617bf2b3df2d3a39e19c 0.004159840000 0 of 1 -
01: e1f412199437cfde8ee1e4d6a14f514d0bcaac1803114b334364a30400a342e3 0.030000000000 153647 of 324336 -
02: 46854d23498aac86e311bb7111e0b49fe27f6e0600c60888ef49b390aee9cdcc 0.060000000000 97024 of 264760 -
03: 695f934f0791d1d0a8b3c9c8f09256369cad6504e1cf2b145d781cabc12b4e76 0.200000000000 272544 of 1272210 -
04: 7f4bdfe298bac6e9f41ed0bc3ede41464dd132697225b51c22c21f61fe1523bc 0.700000000000 84825 of 514466 -
05: b373fa48925033dfa7e8379406da1f61bd955658cf8ebffe5719905e810dec25 2.000000000000 56609 of 434057 -
06: 77b03744b216ce7561d9e2dc1dc2a0a3b689ac3a8889e7cc514d5c9236d3ee22 3.000000000000 35868 of 300495 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-22 23:22:14 till 2014-07-28 11:29:38; resolution: 0.21 days)

  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |________________________________________________________________________*________________________________________________________________________________________________*|

2 inputs(s) for total of 6.000000000000 xmr

key image 00: 1c5e6a17c0a74418e4cf2597e60a1d832567f78ba61df9c9c97d0a3e8090591f amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 50be4fe1f747681ef98f7dfdc2609e0e657f3ba947d706172c1d3fb6d3863a13 00097421 1 5/149 2014-06-23 00:22:14 10:092:09:21:58
- 01: a59a032be1046cc4aabb9b350cdb294df97105836e21cb3a075e711e9b9c039f 00148465 2 6/6 2014-07-28 10:29:38 10:056:23:14:34
key image 01: e56d47b92a379aa266c134ca1c1d1fd28ca0a6df2dd8c5a09115bd822e7fad4d amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3365e4bea36ca3e7728781373f04031e76c82508357f6cbb3a0b72974cd44405 00118970 1 3/4 2014-07-08 00:35:13 10:077:09:08:59
- 01: 75609b4f9b3547aa63c7ed49462fb0d96ae1efe069ea22a37783c037b5589986 00148374 0 0/4 2014-07-28 09:06:23 10:057:00:37:49
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 1000000000000, "key_offsets": [ 39536, 103303 ], "k_image": "1c5e6a17c0a74418e4cf2597e60a1d832567f78ba61df9c9c97d0a3e8090591f" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 40697, 35506 ], "k_image": "e56d47b92a379aa266c134ca1c1d1fd28ca0a6df2dd8c5a09115bd822e7fad4d" } } ], "vout": [ { "amount": 4159840000, "target": { "key": "70ec904dcc5a697505bb94fc39d9a2230b50a640088b617bf2b3df2d3a39e19c" } }, { "amount": 30000000000, "target": { "key": "e1f412199437cfde8ee1e4d6a14f514d0bcaac1803114b334364a30400a342e3" } }, { "amount": 60000000000, "target": { "key": "46854d23498aac86e311bb7111e0b49fe27f6e0600c60888ef49b390aee9cdcc" } }, { "amount": 200000000000, "target": { "key": "695f934f0791d1d0a8b3c9c8f09256369cad6504e1cf2b145d781cabc12b4e76" } }, { "amount": 700000000000, "target": { "key": "7f4bdfe298bac6e9f41ed0bc3ede41464dd132697225b51c22c21f61fe1523bc" } }, { "amount": 2000000000000, "target": { "key": "b373fa48925033dfa7e8379406da1f61bd955658cf8ebffe5719905e810dec25" } }, { "amount": 3000000000000, "target": { "key": "77b03744b216ce7561d9e2dc1dc2a0a3b689ac3a8889e7cc514d5c9236d3ee22" } } ], "extra": [ 2, 33, 0, 67, 163, 234, 46, 159, 111, 64, 250, 166, 230, 144, 69, 194, 178, 81, 250, 241, 163, 200, 42, 42, 20, 67, 93, 133, 253, 90, 23, 157, 188, 20, 40, 1, 250, 55, 161, 32, 37, 48, 19, 91, 235, 166, 151, 184, 210, 10, 229, 156, 131, 48, 208, 131, 75, 61, 123, 76, 198, 49, 112, 184, 147, 55, 8, 131 ], "signatures": [ "c569ec2a41b48b5cce86a7857868bfcc823c6406a01de08eaca2f644aa16a50d45d78a1a2f9279425cfd7bb5977caba7eb306fddec905a3980f80a54f3cb8b0da4890e2acbe98e1b67cd53652c3c37123786ee3ffccae4488288edeb46fad00883cb2b2dfa60e2f4edfdc0c1ab4b1fed6a9009ea91c30ce3fed5866f9a303903", "e2ead060be84f879e3dea6d1dd3eb4ab11c4b124579a1e48ba64878c13ca8a08a13def55b8d84721428e8533fba5df889a88afb7729d0fd25e91b6674d83ca04a050b13487b8bd459bd472e22ca43c92107595a64281e9445dd9756f7ff5500683c779ac5b20442054b72861daacb0b1e3ac2ea9d83622b6d38c83d2d733f000"] }


Less details
source code | moneroexplorer