Monero Transaction 30627840c738c6b50aca0ff39a7081667b00c0423046c05b1a89ba92eb2ae6ff

Autorefresh is OFF

Tx hash: 30627840c738c6b50aca0ff39a7081667b00c0423046c05b1a89ba92eb2ae6ff

Tx public key: ec624c8b1485af76714232d5971018a376c161b04a8f74672f5bcaebc915c6d4

Transaction 30627840c738c6b50aca0ff39a7081667b00c0423046c05b1a89ba92eb2ae6ff was carried out on the Monero network on 2014-07-20 15:38:34. The transaction has 3150072 confirmations. Total output fee is 0.008529344862 XMR.

Timestamp: 1405870714 Timestamp [UTC]: 2014-07-20 15:38:34 Age [y:d:h:m:s]: 10:128:08:15:45
Block: 137222 Fee (per_kB): 0.008529344862 (0.006970510087) Tx size: 1.2236 kB
Tx version: 1 No of confirmations: 3150072 RingCT/type: no
Extra: 01ec624c8b1485af76714232d5971018a376c161b04a8f74672f5bcaebc915c6d4

12 output(s) for total of 11.670000000000 xmr

stealth address amount amount idx tag
00: 4bc541618532bec460e89667b44595cea9ffc3d833b2beae09a955490d4e09a2 0.070000000000 85032 of 263947 -
01: c696325a243e51f86c12e4ced2df5b19a90ee5d0bae419e9ea119e42d506e460 0.400000000000 98305 of 688584 -
02: 9f4d55622c8a93be109501d6a4ad870de9cd059cb179b7263f4dbc267cd9f6f4 0.500000000000 144864 of 1118624 -
03: 71fe4ca8b02093893167ad889eb9d868a34e6f9e3a8985e6f7c397ff8f4045a7 0.500000000000 144865 of 1118624 -
04: 55e8dfba502437602e5ab6ea57fd898dd7b0307522d1b9ebefd1fef8db4ac11a 0.500000000000 144866 of 1118624 -
05: b21b0d93073a93a2d9ffc307184c8ce56de13717363cbed45a8a92b7249b30de 0.500000000000 144867 of 1118624 -
06: b2600558f5f8baaea5c5ca787e76de3c90b89c215a7a2401b2868b09fb30fa61 0.500000000000 144868 of 1118624 -
07: 8a1b5ef83696b786552dc9fb9882e6035e90d69563653e33d005dc44a010ba04 0.600000000000 97238 of 650760 -
08: c33a36f51318b212580cdf24bd0f1f6a922f071ff397a48fc7b744bd6612d382 0.600000000000 97239 of 650760 -
09: 19442f333d8598f8592481ba0b36af0039c19d0a04a196b4ccfd98265f5af08c 0.700000000000 73780 of 514467 -
10: 0974b1d7d3f9c5275b4d163a859d0414374555e385a9565141e016b84e05d404 0.800000000000 74816 of 489955 -
11: 9b9c0514def4c74f9ccf1023a1379b5f695f7230790dae91d72eb47363a29f57 6.000000000000 70309 of 207703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



7 inputs(s) for total of 11.678529344862 xmr

key image 00: 6cd743ef7c45f0018b5d52939451af8e7d7db4d744059f05dec5210d172977d2 amount: 0.002529344862
ring members blk
- 00: cbca995fdaf0d17136e24469de1b6abeecdd5a39a3cbd8ae3314f80f3ae7a4ba 00136261
key image 01: 5278bbc84d206d6dbaa1cd7084e7de7aeb16f46fe4e6811ebdb4a2a4f27989bd amount: 0.006000000000
ring members blk
- 00: 70dd249b0d2ce9a468fea089be438308c5af4ad07648197766efbb7601672214 00137001
key image 02: de66128b07106d220babc380117403edd11eb500f2fafd79d674aaa431919453 amount: 0.070000000000
ring members blk
- 00: e54ea0a83406c7959361d0b7eb094411bb36a49c3316e413975915cbf98a1844 00137078
key image 03: 5ef1334c102cba5eb8ea34c8aba78c0ff6e4c264526c0f6a458082320c037526 amount: 0.800000000000
ring members blk
- 00: fe7b039c9cc7f22fd766e4f601ca834c6fbce22c976ce37353cc2a184e843b95 00137160
key image 04: 42c3959785a01997a18901bcf0d3811a6ed0f39cea67fe74f2b2d344894bf3b0 amount: 0.400000000000
ring members blk
- 00: 4aed9bbe864dafa7cc9c6f54226e2ef63042c3815abd9564742a9f927336b6e2 00137115
key image 05: fd4301c384cea2ab452cb61b1cf28e1743cd5f00b96a460cad738da562831deb amount: 0.400000000000
ring members blk
- 00: 743495f5b55bfe06295b145f646bcf42d93fc9514388d0e8ce1ac89b9db752ea 00137119
key image 06: 8db1738a6f913d3636d383e349cc58af3f5fee3c9330353d706a86a1da88dc7d amount: 10.000000000000
ring members blk
- 00: 75b1ccadf1224434e151cfaa45440af5fc2054cb9d30235e63cf114e4ac5e1eb 00137066
More details
source code | moneroexplorer