Monero Transaction f5393ba6ffd83221e2098b8209e95352515ac312baaf2cd28cac4223faa2adf3

Autorefresh is OFF

Tx hash: f5393ba6ffd83221e2098b8209e95352515ac312baaf2cd28cac4223faa2adf3

Tx prefix hash: a4282f122d739ad446d4aaab030771cb8dda0586a3a902a7401cfc1b8568ff6e
Tx public key: dfed7b86180c5d86c2e319066e7b23299bbbad58ff45ab1fae6e677a238b98eb
Payment id: e34b49f02ecf615d7a3a55424d6deed40c765684707a0fdc1fc798730d6d61ba

Transaction f5393ba6ffd83221e2098b8209e95352515ac312baaf2cd28cac4223faa2adf3 was carried out on the Monero network on 2014-08-02 04:18:19. The transaction has 3138749 confirmations. Total output fee is 0.006569950000 XMR.

Timestamp: 1406953099 Timestamp [UTC]: 2014-08-02 04:18:19 Age [y:d:h:m:s]: 10:125:02:16:41
Block: 155241 Fee (per_kB): 0.006569950000 (0.009707978066) Tx size: 0.6768 kB
Tx version: 1 No of confirmations: 3138749 RingCT/type: no
Extra: 022100e34b49f02ecf615d7a3a55424d6deed40c765684707a0fdc1fc798730d6d61ba01dfed7b86180c5d86c2e319066e7b23299bbbad58ff45ab1fae6e677a238b98eb

7 output(s) for total of 10.001430050000 xmr

stealth address amount amount idx tag
00: d705bfb4a937ea577714ddb5b1574af45451b3aa973876a436af9c4df7805090 0.001430050000 0 of 1 -
01: 6745438238a2b8ae31bcbe6d12736530e793f0b5eeb4360497a28b9a88591ad9 0.040000000000 128323 of 294095 -
02: 3f709768cefe3c318a72ddc93919a07f8a1af29d134324dee414c5dfedb00d14 0.060000000000 99217 of 264760 -
03: 020213370219abf6f9750407c800088cdd123150e94e11cc50511487eb556f62 0.100000000000 355744 of 982315 -
04: e71ade14906801eb3211b10f12d1abcad8c342833145a0cae0e02ce63c347114 0.800000000000 95203 of 489955 -
05: e8959e5dff0690246b7e58d687470b4fa740c0c6ef29bd6e42616cb99a3c2cc5 3.000000000000 38878 of 300495 -
06: 849c17278c55b522de7486457eb2eb56b0dc450904536588d391f78a1314c279 6.000000000000 73053 of 207703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-04-29 17:26:02 till 2014-08-02 02:04:29; resolution: 0.56 days)

  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |____________________________________________________________________________________________________________________*____________________________________________________*|

2 inputs(s) for total of 10.008000000000 xmr

key image 00: f15fd9c556d236b4c948f62279b314a2ec42b205e6df99061e537e5ec521e645 amount: 0.008000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ece1c30c9f5a41c01281087fb4f25eb725c433ce997982cadcc758d851db1002 00017132 0 0/7 2014-04-29 18:26:02 10:219:12:08:58
- 01: 1ae8aced1860d155c99354e98864088846c259a83f9dff84277059a51ae3eec7 00155012 0 0/5 2014-08-01 23:52:22 10:125:06:42:38
key image 01: 68fb3feb68542518fc60737007deb50b8719fd16bf50772d63c4aa86cb9f9f7f amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: de4527413008ef90e621e522c5077c39c64c4ffc4d1da06b40f82f5ed4295e9b 00112207 0 0/5 2014-07-03 07:33:02 10:154:23:01:58
- 01: 2c815445a4c87bf58844dc841ba86bd1f68986652836e321c624a5f5537ac2fe 00155082 0 0/5 2014-08-02 01:04:29 10:125:05:30:31
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 8000000000, "key_offsets": [ 1765, 159562 ], "k_image": "f15fd9c556d236b4c948f62279b314a2ec42b205e6df99061e537e5ec521e645" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 124549, 53148 ], "k_image": "68fb3feb68542518fc60737007deb50b8719fd16bf50772d63c4aa86cb9f9f7f" } } ], "vout": [ { "amount": 1430050000, "target": { "key": "d705bfb4a937ea577714ddb5b1574af45451b3aa973876a436af9c4df7805090" } }, { "amount": 40000000000, "target": { "key": "6745438238a2b8ae31bcbe6d12736530e793f0b5eeb4360497a28b9a88591ad9" } }, { "amount": 60000000000, "target": { "key": "3f709768cefe3c318a72ddc93919a07f8a1af29d134324dee414c5dfedb00d14" } }, { "amount": 100000000000, "target": { "key": "020213370219abf6f9750407c800088cdd123150e94e11cc50511487eb556f62" } }, { "amount": 800000000000, "target": { "key": "e71ade14906801eb3211b10f12d1abcad8c342833145a0cae0e02ce63c347114" } }, { "amount": 3000000000000, "target": { "key": "e8959e5dff0690246b7e58d687470b4fa740c0c6ef29bd6e42616cb99a3c2cc5" } }, { "amount": 6000000000000, "target": { "key": "849c17278c55b522de7486457eb2eb56b0dc450904536588d391f78a1314c279" } } ], "extra": [ 2, 33, 0, 227, 75, 73, 240, 46, 207, 97, 93, 122, 58, 85, 66, 77, 109, 238, 212, 12, 118, 86, 132, 112, 122, 15, 220, 31, 199, 152, 115, 13, 109, 97, 186, 1, 223, 237, 123, 134, 24, 12, 93, 134, 194, 227, 25, 6, 110, 123, 35, 41, 155, 187, 173, 88, 255, 69, 171, 31, 174, 110, 103, 122, 35, 139, 152, 235 ], "signatures": [ "095b027b21b419e9b32eec1462c54f0e5b74772948cb4ba7ab473ade4828f8085223b6369fcb5f559086628c674093cb5dd22e25e19b8c6487fd0325cd551b02be5e99a6629b50dc9c7b5182ea23042c1a28b12eb0f54f41f2a7fc3f48b956073c04762414bb9a9d2091fc4ceeec8d81bd5f74b16ac6418aff37b820c380a30a", "8421a442f95d3f5950d933c897d284e1b7c2664e94426ee436881aef348781077857fe331c379abdee4eff3185272683002d67be4244415e08a10244d56ffa0431ea60fb55a46cc87d70e9f09cbb3ba89aedcc87942185e404eaeecad1993d008941ac5d6f35c6facc0b34a24b8a6eb8420414871d2450faeed0043da473ba0b"] }


Less details
source code | moneroexplorer