Monero Transaction 0d30c5f05a23719936f481890b9d401b73982fa6c2abc41f29ba59ee88bf3bde

Autorefresh is OFF

Tx hash: 0d30c5f05a23719936f481890b9d401b73982fa6c2abc41f29ba59ee88bf3bde

Tx prefix hash: f778fe6975e556aaeb0263867b1655543354a448c7f4abe6782eaeb3d7bce390
Tx public key: c13578108375ecec945c7a12d597ff5129255cd4e5f313831f993cb3a25b10d4
Payment id: cfbceb09619f4df80296d06a7213a1a8b2604d62b2c418ae3881dd5edd08634d

Transaction 0d30c5f05a23719936f481890b9d401b73982fa6c2abc41f29ba59ee88bf3bde was carried out on the Monero network on 2014-05-28 02:38:18. The transaction has 3220424 confirmations. Total output fee is 0.000001000000 XMR.

Timestamp: 1401244698 Timestamp [UTC]: 2014-05-28 02:38:18 Age [y:d:h:m:s]: 10:171:23:46:08
Block: 59716 Fee (per_kB): 0.000001000000 (0.000001299492) Tx size: 0.7695 kB
Tx version: 1 No of confirmations: 3220424 RingCT/type: no
Extra: 022100cfbceb09619f4df80296d06a7213a1a8b2604d62b2c418ae3881dd5edd08634d01c13578108375ecec945c7a12d597ff5129255cd4e5f313831f993cb3a25b10d4

5 output(s) for total of 11.000196000000 xmr

stealth address amount amount idx tag
00: 0b8046c65b9be5efaa14a64b0bc6a1667b32c5f2e774783727ad2e32a0843e30 0.000006000000 11463 of 42147 -
01: fb4a9af52321c52b3405b44f67789974d439c57a4257cd1ca0b6567e36f9419d 0.000090000000 26408 of 61123 -
02: 835e6d22633b1a2f8ea74b8ab3f22cfd2edc4aa2457d3f454f268b44e5f3fd31 0.000100000000 26225 of 79261 -
03: 36334c8749b9f21b4ee71c0041e299e66e2690bc6b2c5dd659f56d9b933f1ad4 1.000000000000 5248 of 874629 -
04: a3efc2dff40ce0f1e6c175e5c2c36a25f970e6757d8897bc208acc26f68e8654 10.000000000000 59520 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-26 11:56:56 till 2014-05-28 02:47:46; resolution: 0.01 days)

  • |_____*____________________________________________________________________________________________________________________________________________________________________|
  • |_____________________________________________________________________________________________________________________________________________________________________*____|
  • |_________________________________________________________________________________________________________________________________________________________________*________|
  • |_______________________________________________________________________*__________________________________________________________________________________________________|
  • |__________________________________________________________________________________________________________________________________________________________*_______________|

5 inputs(s) for total of 11.000197000000 xmr

key image 00: f97816a9aeae89d4f01ec62a818edd8464a8bfe6a57f4b2d7f7d4d257af3e833 amount: 0.000001000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: fe960d1b1a12e73c7ec6fded54b35019736442ba48e7088fca6865a9805f8d46 00057354 1 33/303 2014-05-26 12:56:56 10:173:13:27:30
key image 01: 1a7befcb9e26c774044285dbe6d9abd1aeeabe302c86daa72915a32aa55dc689 amount: 0.000190000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6b4f84736ba16a0e4ae410af009d61ad66479b8e231d869ec97ae3dd2319f0f6 00059656 1 48/177 2014-05-28 01:47:46 10:172:00:36:40
key image 02: 3890b794e99b129cfbf2cefb1c9d08d49bb244ea3160969ad48ca89140b1f7c6 amount: 6.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 41763b91c4b88efe161e36a91de9ca184255dbe8a8a9f3c6cc05e67657eec252 00059592 1 40/169 2014-05-28 00:46:27 10:172:01:37:59
key image 03: 0fe1fa88fd46d288113cfbedace16a1513caa0a661a9506c60bf1a041a23655c amount: 0.000006000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5308df69794fc294a7d92b7fda32500ba0116db8d6583178d2b64abe4ad26071 00058297 1 45/7 2014-05-27 04:08:54 10:172:22:15:32
key image 04: 99b5bc514efac7366e0a13df00b852fa797584a5d3cd2ddd190b073f7609159a amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c715eeeaa15748c986b660d8567789e040d7b539239274879989e5f11e4de083 00059492 1 29/163 2014-05-27 23:15:33 10:172:03:08:53
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 1000000, "key_offsets": [ 10582 ], "k_image": "f97816a9aeae89d4f01ec62a818edd8464a8bfe6a57f4b2d7f7d4d257af3e833" } }, { "key": { "amount": 190000000, "key_offsets": [ 82 ], "k_image": "1a7befcb9e26c774044285dbe6d9abd1aeeabe302c86daa72915a32aa55dc689" } }, { "key": { "amount": 6000000000000, "key_offsets": [ 22719 ], "k_image": "3890b794e99b129cfbf2cefb1c9d08d49bb244ea3160969ad48ca89140b1f7c6" } }, { "key": { "amount": 6000000, "key_offsets": [ 11269 ], "k_image": "0fe1fa88fd46d288113cfbedace16a1513caa0a661a9506c60bf1a041a23655c" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 2046 ], "k_image": "99b5bc514efac7366e0a13df00b852fa797584a5d3cd2ddd190b073f7609159a" } } ], "vout": [ { "amount": 6000000, "target": { "key": "0b8046c65b9be5efaa14a64b0bc6a1667b32c5f2e774783727ad2e32a0843e30" } }, { "amount": 90000000, "target": { "key": "fb4a9af52321c52b3405b44f67789974d439c57a4257cd1ca0b6567e36f9419d" } }, { "amount": 100000000, "target": { "key": "835e6d22633b1a2f8ea74b8ab3f22cfd2edc4aa2457d3f454f268b44e5f3fd31" } }, { "amount": 1000000000000, "target": { "key": "36334c8749b9f21b4ee71c0041e299e66e2690bc6b2c5dd659f56d9b933f1ad4" } }, { "amount": 10000000000000, "target": { "key": "a3efc2dff40ce0f1e6c175e5c2c36a25f970e6757d8897bc208acc26f68e8654" } } ], "extra": [ 2, 33, 0, 207, 188, 235, 9, 97, 159, 77, 248, 2, 150, 208, 106, 114, 19, 161, 168, 178, 96, 77, 98, 178, 196, 24, 174, 56, 129, 221, 94, 221, 8, 99, 77, 1, 193, 53, 120, 16, 131, 117, 236, 236, 148, 92, 122, 18, 213, 151, 255, 81, 41, 37, 92, 212, 229, 243, 19, 131, 31, 153, 60, 179, 162, 91, 16, 212 ], "signatures": [ "042aecf37d60bab909ef5cd94d894ce0d79fd6d68bd8c2e150b37ccdd32c3c09b5df7a4059766be423210da2ac3080667dfaa9d01cb0aa9b779bcbcb07194d0b", "1f88611263b58364e8402ccb42fc2344219f7d888a9f73413078279e363fbf0823bc83e731d2f96c983a81948b209a81c64c4f02844032279891475d83a5680d", "912bea6b3ff72b15f8adc529626b34e111e41135e5daae69112e03a8326b910b779996f4e1467ff014aa61dfb2efd3aeac88a6c3edd7b4714bbfb6ecf0c3fe0f", "6d815c6bd59e11a8225c5ba2dcdb3b9b0fdb9a464eaf7e1a537994e915d7b608a684bbb873a74443282b20bd7bf428026b9d400c755695e9ef26b35bc17f3a0d", "95eeff040fc2ea3df99d105f5bbf5157dcd1a3852ecf50ff41a2eba3fd8a46034cea0ac055eccf0fbec7d606a2f384ef7c9d6bbc77fc8e6635deeae18564ab06"] }


Less details
source code | moneroexplorer