Monero Transaction 30134799d84432b366a6c5e06fa7bf7e6fb080895aefc589fbc4807e89b5b399

Autorefresh is OFF

Tx hash: 30134799d84432b366a6c5e06fa7bf7e6fb080895aefc589fbc4807e89b5b399

Tx prefix hash: d888b83222596108c27d9bfbf763fc08584ca78a11c0c3b1111a9c682b51cca8
Tx public key: 4b521064aa68b9f746dcc351c2947f7acfa625496d10561351cae71d89788f11
Payment id: d2a08dfdb1445ab22e308fadc6fc68b28e3432306342e2259bc0a0beb8bd1bbc

Transaction 30134799d84432b366a6c5e06fa7bf7e6fb080895aefc589fbc4807e89b5b399 was carried out on the Monero network on 2014-08-19 20:30:51. The transaction has 3123982 confirmations. Total output fee is 0.007399560000 XMR.

Timestamp: 1408480251 Timestamp [UTC]: 2014-08-19 20:30:51 Age [y:d:h:m:s]: 10:122:04:14:05
Block: 180601 Fee (per_kB): 0.007399560000 (0.007892864000) Tx size: 0.9375 kB
Tx version: 1 No of confirmations: 3123982 RingCT/type: no
Extra: 022100d2a08dfdb1445ab22e308fadc6fc68b28e3432306342e2259bc0a0beb8bd1bbc014b521064aa68b9f746dcc351c2947f7acfa625496d10561351cae71d89788f11

5 output(s) for total of 7.132600440000 xmr

stealth address amount amount idx tag
00: bc24bf27e046758df21141fe01af3d95f2d9bd45b7e8c0ccc5ce54e94f43e7ae 0.002600440000 0 of 1 -
01: 71b45b023ec43d00b6e7ce7bcc14e3d9b9a9994c6d384e96353e2f7b9f58e09a 0.030000000000 165927 of 324336 -
02: fd9c2e4a9d7f7d4fa05c4c856e1604fe9d466abd748c861ae4e9b6426e0f2687 0.100000000000 453879 of 982315 -
03: 13da60d04f2b5df290c11e9075fa4c4bd6a3aed2ab8a5e3e8fde93afdd190314 2.000000000000 79279 of 434058 -
04: f22f250791c1ea3e21f1220c5167499d6d1ebbb9bb777b1d8d9e67a3a44e6c6b 5.000000000000 105693 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-27 04:01:30 till 2014-08-19 20:34:15; resolution: 0.50 days)

  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |____________________*____________________________________________________________________________________________________________________________________________________*|
  • |________________________________________________________________________________*________________________________________________________________________________________*|
  • |_________________________________________________*_______________________________________________________________________________________________________________________*|

4 inputs(s) for total of 7.140000000000 xmr

key image 00: 2f541dfc51afcd3e5bf46c92ac4c1d62a61be05ecf9fdcd29a8a36f4fdab55a7 amount: 0.040000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 45bd838245f3bba40340dba7b65a214236670b8feb64845797b6a754cca65ef1 00058351 1 3/111 2014-05-27 05:01:30 10:206:19:43:26
- 01: 2e814ff8c04dfcb3fbe627ee4015964225728facfbc9f47066277e6de338a6f7 00180256 0 0/6 2014-08-19 14:32:26 10:122:10:12:30
key image 01: e9a051e022464e769f46434dd76e0c55a05f4c110a11bb667998457f6d7c0fda amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5f155eb116f155448d4aba86b2b13205f5272057e0e2f81bb5b680610a8be8e0 00072699 1 60/66 2014-06-06 02:29:48 10:196:22:15:08
- 01: bfd849d5ba3ff6e9c929108de3932dbc71f2ac7bc5176bcc40def0010865126b 00180524 2 2/4 2014-08-19 19:22:49 10:122:05:22:07
key image 02: 30bcfa2ba3d7a5ce4c984dff7a4814ba6a78a972dbadb93fe0dd5b566b7d6452 amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7c0105b9ff15419b2bacae3a4bbef7adfceb1e2179337c5ed1c6c5073d781625 00116176 1 10/54 2014-07-06 00:31:55 10:167:00:13:01
- 01: 7216652869e67c703654ee00e08cf699d2baab32729f83078ed6609319608e19 00180513 2 3/7 2014-08-19 19:15:19 10:122:05:29:37
key image 03: 3c8709d68630e472b666296effcd0a5ac22b52de5daf653aa36bcc2e2d81b891 amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7e0a8b12a0d73209cf8daa5a356abca2c268e31c6369c0e0a33fb86731fe366a 00093657 1 10/159 2014-06-20 12:44:35 10:182:12:00:21
- 01: 9d9d5d60e0a21d681f964e3fd3e0bfd6c67fcbdb173657e8ed9ac08d7d61eb21 00180533 0 0/6 2014-08-19 19:34:15 10:122:05:10:41
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 40000000000, "key_offsets": [ 14113, 123419 ], "k_image": "2f541dfc51afcd3e5bf46c92ac4c1d62a61be05ecf9fdcd29a8a36f4fdab55a7" } }, { "key": { "amount": 3000000000000, "key_offsets": [ 4679, 43304 ], "k_image": "e9a051e022464e769f46434dd76e0c55a05f4c110a11bb667998457f6d7c0fda" } }, { "key": { "amount": 100000000000, "key_offsets": [ 239831, 213517 ], "k_image": "30bcfa2ba3d7a5ce4c984dff7a4814ba6a78a972dbadb93fe0dd5b566b7d6452" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 11737, 37061 ], "k_image": "3c8709d68630e472b666296effcd0a5ac22b52de5daf653aa36bcc2e2d81b891" } } ], "vout": [ { "amount": 2600440000, "target": { "key": "bc24bf27e046758df21141fe01af3d95f2d9bd45b7e8c0ccc5ce54e94f43e7ae" } }, { "amount": 30000000000, "target": { "key": "71b45b023ec43d00b6e7ce7bcc14e3d9b9a9994c6d384e96353e2f7b9f58e09a" } }, { "amount": 100000000000, "target": { "key": "fd9c2e4a9d7f7d4fa05c4c856e1604fe9d466abd748c861ae4e9b6426e0f2687" } }, { "amount": 2000000000000, "target": { "key": "13da60d04f2b5df290c11e9075fa4c4bd6a3aed2ab8a5e3e8fde93afdd190314" } }, { "amount": 5000000000000, "target": { "key": "f22f250791c1ea3e21f1220c5167499d6d1ebbb9bb777b1d8d9e67a3a44e6c6b" } } ], "extra": [ 2, 33, 0, 210, 160, 141, 253, 177, 68, 90, 178, 46, 48, 143, 173, 198, 252, 104, 178, 142, 52, 50, 48, 99, 66, 226, 37, 155, 192, 160, 190, 184, 189, 27, 188, 1, 75, 82, 16, 100, 170, 104, 185, 247, 70, 220, 195, 81, 194, 148, 127, 122, 207, 166, 37, 73, 109, 16, 86, 19, 81, 202, 231, 29, 137, 120, 143, 17 ], "signatures": [ "ad084bb908aa75fd41463eef5151fc6f4e481a6f7f9db32803535597d8969f0e1c6d32683c7da739ec7167ee9c4e1ea39ea6d46d45257cfcfdec37724bb3e8097f31344c1bc4b46688874261e2eb1db073dfb16c393174c263d2cb61aa82c001278aa91725e5382b3cbf7773d997462ca0d49e002bfae45b0ecb5436a5755a09", "8d1208f64838ca859b9b449e890d47c31d22009a77d97b3d13566273db43160844782e8823262817a2b49280aa63a63df1205a08a70e7fefc0d058f4b7c1500bb97c410bd7c488b4abcd4ce50dc3b55f163a3518ef3b4f17ce5dccf7ec20d30a70997bf902c92af1136625885b1320935c51cfa698d8bedafc38d750b409270e", "da1fd2380f70e36f9e5105e9ed94b8a0fe49ae1e2e4354b76f0ac49751565c0b94e1c7e6da9edb2cfabd68e1f962eeb0c2f446729cb6eb7705e4ed489268e00263216af1e8423711d0c07a588827c2145961ccc05d2b0323cb23c94c07a9f80b992bc61517a755d09d536eca93348ee8888774398e126cfe1a9463b1dadb9603", "cfa46d1fc1a1b0782528a3da333229f349a320e46a74049b37274265b679530d1b8ff9f3ab65079970b2b0860f815e0af81738423d5a259e245ba2dffccb140b203474d38ec4d4c3a8654f457423bd58463482080e26b86708d1b6fa13aaa6039b63f1fad3f76ada0041a50e01744b35dcbb5c6c9a9a1814b1602a93645cbb0a"] }


Less details
source code | moneroexplorer