Monero Transaction f5dc52cafba96fa2ca53f26198d982fb47a0582c24a6972b3ad959a64fdc430a

Autorefresh is OFF

Tx hash: f5dc52cafba96fa2ca53f26198d982fb47a0582c24a6972b3ad959a64fdc430a

Tx prefix hash: 261e81a3d39f678d9fed28d6e2d00fc2db2bc29b5212fe82a7f733879547046e
Tx public key: f77f85b7128e509481f57397d2ce053799772713b2c680836704af21cf91468e
Payment id: 92453b45c2fb4ddb9879a920674c95ee6b354240326d46289250ce615f37948b

Transaction f5dc52cafba96fa2ca53f26198d982fb47a0582c24a6972b3ad959a64fdc430a was carried out on the Monero network on 2014-07-03 18:56:04. The transaction has 3165431 confirmations. Total output fee is 0.006000000000 XMR.

Timestamp: 1404413764 Timestamp [UTC]: 2014-07-03 18:56:04 Age [y:d:h:m:s]: 10:132:18:15:28
Block: 112918 Fee (per_kB): 0.006000000000 (0.009365853659) Tx size: 0.6406 kB
Tx version: 1 No of confirmations: 3165431 RingCT/type: no
Extra: 02210092453b45c2fb4ddb9879a920674c95ee6b354240326d46289250ce615f37948b01f77f85b7128e509481f57397d2ce053799772713b2c680836704af21cf91468e

4 output(s) for total of 1.994000000000 xmr

stealth address amount amount idx tag
00: ae29b0329c657754432272d9541c45bc55a6761252e8b36e8594aae2f60bff06 0.004000000000 33048 of 89181 -
01: 5ce85161b68d0dfae2f0ece3dcb29b25c0faa02f3fb7dccb082fca2dd7d8ea5d 0.090000000000 73324 of 317822 -
02: c93d3ee0af168be684cb6744b6dcf06a4e59e2b2e8abb9983b3266b3e022c070 0.900000000000 43297 of 454894 -
03: 8615932e6c4be31998606413a80285a27ea630ae60f4fbf237fcac367ff6db22 1.000000000000 69347 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-01 13:04:53 till 2014-07-03 09:05:42; resolution: 0.01 days)

  • |______________________________________________________*___________________________________________________________________________________________________________________|
  • |______________________________________________________________________________________________________________________*___________________________________________________|
  • |______________________________________________________________________________________________________________________________________________________________________*___|
  • |____*_____________________________________________________________________________________________________________________________________________________________________|

4 inputs(s) for total of 2.000000000000 xmr

key image 00: 471baf033409658a9824778981029c7b2690d9754b9553728b288ef6e42cc0e3 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3e15af3f17d9e4244ce5974e8e5b9704ec9a58bef7882a27df66419a550eb431 00110526 1 19/64 2014-07-02 03:05:55 10:134:10:05:37
key image 01: c2f10c23d83c40fd2188df2b81f333f79807ee891b641d1923a9cbd39730a6b2 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5bc458f496180916de1ef717c66180c6ba7f0276742c6af750bf543ac0f2298a 00111476 1 10/66 2014-07-02 19:35:51 10:133:17:35:41
key image 02: 6a554cf2b0044c760b56f648c94b42f8bb78a984d657589816973ca88eed981e amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5e282a95fa9ea900c27abfa6536d2218891f996ae1b5678c9dd379015825f0ef 00112249 1 17/63 2014-07-03 08:05:42 10:133:05:05:50
key image 03: f3f4ca0dd08ce49298104eb38fa433b2002d1eda8ab4df7a3fd7d73b50311a13 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e67ba2f9b1bb608341185c81666f91a83a9486d38ce6773133a5ea7ef17d776a 00109740 1 10/63 2014-07-01 14:04:53 10:134:23:06:39
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 500000000000, "key_offsets": [ 82248 ], "k_image": "471baf033409658a9824778981029c7b2690d9754b9553728b288ef6e42cc0e3" } }, { "key": { "amount": 500000000000, "key_offsets": [ 84484 ], "k_image": "c2f10c23d83c40fd2188df2b81f333f79807ee891b641d1923a9cbd39730a6b2" } }, { "key": { "amount": 500000000000, "key_offsets": [ 86264 ], "k_image": "6a554cf2b0044c760b56f648c94b42f8bb78a984d657589816973ca88eed981e" } }, { "key": { "amount": 500000000000, "key_offsets": [ 80283 ], "k_image": "f3f4ca0dd08ce49298104eb38fa433b2002d1eda8ab4df7a3fd7d73b50311a13" } } ], "vout": [ { "amount": 4000000000, "target": { "key": "ae29b0329c657754432272d9541c45bc55a6761252e8b36e8594aae2f60bff06" } }, { "amount": 90000000000, "target": { "key": "5ce85161b68d0dfae2f0ece3dcb29b25c0faa02f3fb7dccb082fca2dd7d8ea5d" } }, { "amount": 900000000000, "target": { "key": "c93d3ee0af168be684cb6744b6dcf06a4e59e2b2e8abb9983b3266b3e022c070" } }, { "amount": 1000000000000, "target": { "key": "8615932e6c4be31998606413a80285a27ea630ae60f4fbf237fcac367ff6db22" } } ], "extra": [ 2, 33, 0, 146, 69, 59, 69, 194, 251, 77, 219, 152, 121, 169, 32, 103, 76, 149, 238, 107, 53, 66, 64, 50, 109, 70, 40, 146, 80, 206, 97, 95, 55, 148, 139, 1, 247, 127, 133, 183, 18, 142, 80, 148, 129, 245, 115, 151, 210, 206, 5, 55, 153, 119, 39, 19, 178, 198, 128, 131, 103, 4, 175, 33, 207, 145, 70, 142 ], "signatures": [ "dd7a2123f7723be55da57be0477f0942415c11e38b187f5a14fb35b817527e07dd0d6736db45e1a8da23762021afbfb789e99f71697f631a3bdc59418635c20e", "473a1b176d7916900a7a41da351772375252bcaa4c1598bca81674a318b6000b870229617cb3f0efcadedca3bbb4c27b06365c1358476204699c93ebc7fff504", "d42cdb4011434a491683ec7ef9ffa31a4b3c06df2168b5232bd5e9ec5f1f870dd8bb6469c5956c32ff7fb4768617192ccbb7cbd97dce7dccd0dd9e2bfb5e770e", "71ed67e6fb6246b7266906e6920882e1bd452f2adf5b61eba45eaa88ecc00d07487fae3b09f5deff11a2d3358a79e1e9ae5c85d0116f0fb355ba203126ab110b"] }


Less details
source code | moneroexplorer