Monero Transaction 034af46e554ff3bc2bb785835bf734a65b0b09a4076e50c783839b00773bbea1

Autorefresh is OFF

Tx hash: 034af46e554ff3bc2bb785835bf734a65b0b09a4076e50c783839b00773bbea1

Tx prefix hash: 7410f2c76fbed5b4dd3e14b5d47018d4777c7e7155340c025ad8e1d23c88d991
Tx public key: 26dac618c84f983e12ba1f7e6a85321578b2a499ebe0e6fa8e8a0058ee8a6f46

Transaction 034af46e554ff3bc2bb785835bf734a65b0b09a4076e50c783839b00773bbea1 was carried out on the Monero network on 2014-06-19 16:53:37. The transaction has 3186013 confirmations. Total output fee is 0.009108499778 XMR.

Timestamp: 1403196817 Timestamp [UTC]: 2014-06-19 16:53:37 Age [y:d:h:m:s]: 10:147:00:34:02
Block: 92478 Fee (per_kB): 0.009108499778 (0.008985649107) Tx size: 1.0137 kB
Tx version: 1 No of confirmations: 3186013 RingCT/type: no
Extra: 0126dac618c84f983e12ba1f7e6a85321578b2a499ebe0e6fa8e8a0058ee8a6f46

12 output(s) for total of 20.791104763904 xmr

stealth address amount amount idx tag
00: d376f36cb6efbedcf22e3d583bc592487847378e402c853197fcbe6595d98610 0.000339231886 0 of 1 -
01: ab1cb64c92738607af43f5442f2495beb02987cd311e98c026c5ee550818e4d4 0.001765532018 0 of 1 -
02: b0265917a62b2e8b5f6eae325b27dcd99f435ab82bc97131016c6259d70b9a39 0.009000000000 129766 of 233398 -
03: 3dac9233c5ee5aa7132f7e10484a37f89ed44feb15cea972efee8b7140449eda 0.050000000000 87453 of 284521 -
04: 71c5690e81760e02c031f840881c1839e4a3b8390e7e372ace31d8e5cf359875 0.060000000000 76294 of 264760 -
05: e209e341762b648f0eddc7e0457ac40469e976982fd012c0abdce9e52dd762f0 0.070000000000 68278 of 263947 -
06: b4961e2f347ca77a5dc07860030cbd9a1519d8a2d119327f31522bba21cfe692 0.200000000000 68707 of 1272210 -
07: 33e199574d753d91371aad0b8ca8f0bfa5d8d2bb83b6466e7cd81dc5ebacaf9c 0.600000000000 24912 of 650760 -
08: d6c9119f1db7269dc833db47686c10f41d71330f784a41be8992dc170c46b7b3 0.800000000000 22578 of 489955 -
09: 61109ffaea248ff1691f80e4d1353d0d95e410bd4083c73e35749054f559e5e0 4.000000000000 11355 of 237197 -
10: 975fdd373ba317da1d66bf2e52214adc12a1122c25bf685a2af7afeed8f6339e 5.000000000000 15450 of 255089 -
11: 04ebc3c97b9a29bafaf6808bf1e01cf15176249971d768252ec5b397a88c1c75 10.000000000000 99005 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-12 02:30:33 till 2014-06-19 17:04:24; resolution: 0.04 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |________________________________________________________________________________________________________________________________________________________________________*_|
  • |________________________________________________________________________________________________________________________________________________________________________*_|
  • |_________________________________________________________________________________________________________________________________________________________________________*|

5 inputs(s) for total of 20.800213263682 xmr

key image 00: abe2e7f2943f02614016a033935f227dafba67b40be83fda0e9b085efbb98561 amount: 0.000213263682
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a53ff87c42122c5ea2f9fe492ab5ebd17cb430ea58a9505f3a0eb50955e34239 00081388 0 0/5 2014-06-12 03:30:33 10:154:13:57:06
key image 01: 9f2e416cfc2c8e09c5bad3effd2fdc7cd1b060f1416f459f8b8f2c12a78bfcd5 amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4cd250386164124e031b29b7036fd68ac96e35a324e96a4890f83a852d539da2 00092415 0 0/5 2014-06-19 16:04:24 10:147:01:23:15
key image 02: fd612a2de86781ddada90132b6aaece38cbc49db78cd8b0eb26c4dd8121f0428 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: cfa2aeeb7256d6dddf6b4095cc545f8dba0972693c7d391c1425815a219701ff 00092387 0 0/5 2014-06-19 15:38:09 10:147:01:49:30
key image 03: 2b5dbf577529ebd753978972edd271441f3fcb0ae2bef287c6b72893f878223a amount: 0.700000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: da2af77dbed22198063ef753f63ec5c892ba85671203cf667fd2b9890a5c5b9a 00092379 0 0/5 2014-06-19 15:26:37 10:147:02:01:02
key image 04: 794073071bd0574258b41e9c17a9523b150312854e747192471f76e4472d1a25 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3fe2257e1b95d0a661681ba934b3001f22151746782b6c0d4cdb53bf57b51263 00092413 0 0/6 2014-06-19 16:04:00 10:147:01:23:39
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 213263682, "key_offsets": [ 0 ], "k_image": "abe2e7f2943f02614016a033935f227dafba67b40be83fda0e9b085efbb98561" } }, { "key": { "amount": 100000000000, "key_offsets": [ 127143 ], "k_image": "9f2e416cfc2c8e09c5bad3effd2fdc7cd1b060f1416f459f8b8f2c12a78bfcd5" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 98877 ], "k_image": "fd612a2de86781ddada90132b6aaece38cbc49db78cd8b0eb26c4dd8121f0428" } }, { "key": { "amount": 700000000000, "key_offsets": [ 23218 ], "k_image": "2b5dbf577529ebd753978972edd271441f3fcb0ae2bef287c6b72893f878223a" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 98915 ], "k_image": "794073071bd0574258b41e9c17a9523b150312854e747192471f76e4472d1a25" } } ], "vout": [ { "amount": 339231886, "target": { "key": "d376f36cb6efbedcf22e3d583bc592487847378e402c853197fcbe6595d98610" } }, { "amount": 1765532018, "target": { "key": "ab1cb64c92738607af43f5442f2495beb02987cd311e98c026c5ee550818e4d4" } }, { "amount": 9000000000, "target": { "key": "b0265917a62b2e8b5f6eae325b27dcd99f435ab82bc97131016c6259d70b9a39" } }, { "amount": 50000000000, "target": { "key": "3dac9233c5ee5aa7132f7e10484a37f89ed44feb15cea972efee8b7140449eda" } }, { "amount": 60000000000, "target": { "key": "71c5690e81760e02c031f840881c1839e4a3b8390e7e372ace31d8e5cf359875" } }, { "amount": 70000000000, "target": { "key": "e209e341762b648f0eddc7e0457ac40469e976982fd012c0abdce9e52dd762f0" } }, { "amount": 200000000000, "target": { "key": "b4961e2f347ca77a5dc07860030cbd9a1519d8a2d119327f31522bba21cfe692" } }, { "amount": 600000000000, "target": { "key": "33e199574d753d91371aad0b8ca8f0bfa5d8d2bb83b6466e7cd81dc5ebacaf9c" } }, { "amount": 800000000000, "target": { "key": "d6c9119f1db7269dc833db47686c10f41d71330f784a41be8992dc170c46b7b3" } }, { "amount": 4000000000000, "target": { "key": "61109ffaea248ff1691f80e4d1353d0d95e410bd4083c73e35749054f559e5e0" } }, { "amount": 5000000000000, "target": { "key": "975fdd373ba317da1d66bf2e52214adc12a1122c25bf685a2af7afeed8f6339e" } }, { "amount": 10000000000000, "target": { "key": "04ebc3c97b9a29bafaf6808bf1e01cf15176249971d768252ec5b397a88c1c75" } } ], "extra": [ 1, 38, 218, 198, 24, 200, 79, 152, 62, 18, 186, 31, 126, 106, 133, 50, 21, 120, 178, 164, 153, 235, 224, 230, 250, 142, 138, 0, 88, 238, 138, 111, 70 ], "signatures": [ "a9d4a4ebf9292e5dd6f74817f40e7329f3f9355f8b0fafc6f986431fff70f30722c5f74f0120ee274400552b53f2f630d2e2492837b19a35a71afc58e7dc9f00", "4fce10cb2874047782a82f344c7ba29881350f003048ed0641b4920a1cf14e0b93ae24c6d0b53e37fd615a5a9bed4849bc046494e39023740ce9ec82e5a5800f", "4b417af0a053a180dfc3833a7c074ad2833732107ec9214ff69299de68a96b0d5f5b1f8b6816032b0b1b109192c0406f63dcd5329de7ea7ac640684f91052e0c", "a2733f63c72068aa7ec77a62de55ad17f3829fdff3c1c40bbe920c176c343d03ca589c62bacdf11af9f5c742fb3fec9f17b9aa83c5969620fa0c8e94cb81d00e", "dd8bf9e397c0dd55cf4c81ee6d82d8dc8aea0be14df1ee215a308a37a8e9ad0aeac985a9632b28ac091d7b806632f70829ad1ea8634d00bb5df855a28df38705"] }


Less details
source code | moneroexplorer