Monero Transaction 3064a3e194e9abc86dee907464d0b4302eb49afa23935c9906a38bd80202b501

Autorefresh is OFF

Tx hash: 3064a3e194e9abc86dee907464d0b4302eb49afa23935c9906a38bd80202b501

Tx public key: 92485fa7ef5ef7f2743e914a69cb017c98ab1875c082f4c94687e097ca724b26
Payment id: eb31f9e1acec41b78d0061d3b738fba6fc4cc7780d384ac5a5822c83a96e502b

Transaction 3064a3e194e9abc86dee907464d0b4302eb49afa23935c9906a38bd80202b501 was carried out on the Monero network on 2014-06-20 08:50:51. The transaction has 3207973 confirmations. Total output fee is 0.017706490000 XMR.

Timestamp: 1403254251 Timestamp [UTC]: 2014-06-20 08:50:51 Age [y:d:h:m:s]: 10:178:06:00:40
Block: 93428 Fee (per_kB): 0.017706490000 (0.020650849385) Tx size: 0.8574 kB
Tx version: 1 No of confirmations: 3207973 RingCT/type: no
Extra: 022100eb31f9e1acec41b78d0061d3b738fba6fc4cc7780d384ac5a5822c83a96e502b0192485fa7ef5ef7f2743e914a69cb017c98ab1875c082f4c94687e097ca724b26

7 output(s) for total of 4.722993510000 xmr

stealth address amount amount idx tag
00: cc7ec9e88bd9f06510f1ecb87dbfc7a806ddcb3f5f74ea3d23aa610660d6d4bb 0.002993510000 0 of 1 -
01: 94174956cc5cb6ff03333fcc7be7f2f0ed4070f0af22bde2c146640a8e29cfca 0.060000000000 77469 of 264760 -
02: 5110c950eb829bc142d25c8dcb915ad7e527772484881609c312dfc03bec90f5 0.060000000000 77470 of 264760 -
03: 9e898bb78f6e9a7221844cd3c1bea4c9ba22e94b54d5c297c826e760e966f14c 0.300000000000 50665 of 976536 -
04: 6d751d6008c6a1b1cd92acfc11e9b4ec835b027fc4f4fddb9acd07060a68137a 0.300000000000 50666 of 976536 -
05: a282a533e77f01a9bc1eb03da77cd5dc08b6efcea1d9a60eab26257cc854fe43 1.000000000000 32935 of 874630 -
06: 809be3588bf6ec6f0e860ae8d70de8e32c27b14ba132f2eafc847b4b07bc0033 3.000000000000 12865 of 300495 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



5 inputs(s) for total of 4.740700000000 xmr

key image 00: 43f8d5fdd4b80276585f3d6d56ac129c212212f3b915b8c07a8d85c985a9aacc amount: 0.000700000000
ring members blk
- 00: 0661bca98d302df7c3ccefa550eede4231e53831d003d48976f1da92473587e3 00073153
key image 01: 1d5bbebc2af2e4c34c6de0da15ce21bf6e544722ad88b81d99ebd44c9189e37b amount: 0.040000000000
ring members blk
- 00: c373cdf07ac22472cc3e6078e310aedbe6d600e6df3a60eea2a22764d7de9414 00077681
key image 02: 0afea52aaba8bd3766e8d6df8f2b88024f71628785de9335786b0d4d148ec2d2 amount: 0.200000000000
ring members blk
- 00: 87279d9df2edafe278300cba14c46e11c1cecf85539ba8e977d430363aeb683b 00092966
key image 03: 8cef1be53a94e278064c78d75b278b5c5d0a24ca4dd8459ecb59c52f13a6ebbc amount: 0.500000000000
ring members blk
- 00: cf5b8f7e1231b99af87043315e70a203a99d1558c884ebdd8743c24739b0fb2b 00090493
key image 04: 1f36556e84a054c3baec38a878c578fd4ad9527a8f960d2a9fc9b358df53a20b amount: 4.000000000000
ring members blk
- 00: 94359c82f26f7bdf6fd7d0cfa5df9efa01a79522fff8dd24a5afaec82a25554e 00091075
More details
source code | moneroexplorer