Monero Transaction 308da4f96b96d5228d3970eb04d706732166f2e32f8cb061791b369fbb0bd7cd

Autorefresh is OFF

Tx hash: 308da4f96b96d5228d3970eb04d706732166f2e32f8cb061791b369fbb0bd7cd

Tx prefix hash: 4416a3502811d71d1b192a40a79727ad6ff73d122ed2c41b48f3818e8aa971c1
Tx public key: 599d5a54adaa593e57966c4dd90107b0738c7b0e4b26ec73f1fb8620821c0af5
Payment id: b1484bd5b74fa8a7cdb459bb3393f94bbe84ccc8eed509846e7a41e176ff296c

Transaction 308da4f96b96d5228d3970eb04d706732166f2e32f8cb061791b369fbb0bd7cd was carried out on the Monero network on 2014-07-19 19:09:50. The transaction has 3142342 confirmations. Total output fee is 0.006470510000 XMR.

Timestamp: 1405796990 Timestamp [UTC]: 2014-07-19 19:09:50 Age [y:d:h:m:s]: 10:116:18:05:06
Block: 136007 Fee (per_kB): 0.006470510000 (0.009588715253) Tx size: 0.6748 kB
Tx version: 1 No of confirmations: 3142342 RingCT/type: no
Extra: 022100b1484bd5b74fa8a7cdb459bb3393f94bbe84ccc8eed509846e7a41e176ff296c01599d5a54adaa593e57966c4dd90107b0738c7b0e4b26ec73f1fb8620821c0af5

7 output(s) for total of 3.063529490000 xmr

stealth address amount amount idx tag
00: e10e2c68133bd462d4fbc9c0ce05b76cfbab7512a2d4a5fe7874e1822416e8c0 0.003529490000 0 of 1 -
01: d2889757827d6765bf757a70d846f82eced06b0be616a07dc485b4b15e9d8043 0.070000000000 84413 of 263947 -
02: 50f19f6bfff7f942e84dcc5b467d7960d4294c12b92ca93f0eeeca44d752b788 0.090000000000 84520 of 317822 -
03: 8e4a870b118afde2a113940cdff3c79e01ce05ff7b65552c2ba944484db140d2 0.100000000000 296256 of 982315 -
04: 4d744e067f3e4da9e7bb08f3f7080f4ca043d2623efe5c534acd090db3a18e1a 0.800000000000 73252 of 489955 -
05: ba3e44b01b3b35624a39336763358b58f9db72131bff980c50aa1b65e0f30463 1.000000000000 116541 of 874629 -
06: 72fba83740aabfed2cd983447d06ed44a594bd3397b5737fd98ccf8bf711ccec 1.000000000000 116542 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-27 00:36:58 till 2014-07-19 18:00:29; resolution: 0.32 days)

  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |____________________________________________*____________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 3.070000000000 xmr

key image 00: d819513a57e0006970ba39458e074cea3a3680e90ebe72aba84870ef29571793 amount: 0.070000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 51e4b30aac6771a7ad79dfea7091fa246438ebb5b687fc0cdfe03d1104186829 00058125 1 15/208 2014-05-27 01:36:58 10:170:11:37:58
- 01: 7e146b07b9a83bdc9417493874e60c5a21a1366515aad4c19a3a1540cea40b50 00135834 2 6/77 2014-07-19 16:31:43 10:116:20:43:13
key image 01: a58470de5f836bfea6b623ebb86c9387514a0efe8d5a12cc980d8a9c8e36f8f7 amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f3e85f83e5153e3f1af6c784b974c93579dd36096a36e11adcba5696ff2ae4a2 00078049 1 12/141 2014-06-09 20:35:24 10:156:16:39:32
- 01: 31edd4b5609f84a8da936728aa882c14fc7a9b8d5b7091f0f417bcabe405f4a7 00135864 2 4/45 2014-07-19 17:00:29 10:116:20:14:27
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 70000000000, "key_offsets": [ 10886, 73501 ], "k_image": "d819513a57e0006970ba39458e074cea3a3680e90ebe72aba84870ef29571793" } }, { "key": { "amount": 3000000000000, "key_offsets": [ 6420, 24074 ], "k_image": "a58470de5f836bfea6b623ebb86c9387514a0efe8d5a12cc980d8a9c8e36f8f7" } } ], "vout": [ { "amount": 3529490000, "target": { "key": "e10e2c68133bd462d4fbc9c0ce05b76cfbab7512a2d4a5fe7874e1822416e8c0" } }, { "amount": 70000000000, "target": { "key": "d2889757827d6765bf757a70d846f82eced06b0be616a07dc485b4b15e9d8043" } }, { "amount": 90000000000, "target": { "key": "50f19f6bfff7f942e84dcc5b467d7960d4294c12b92ca93f0eeeca44d752b788" } }, { "amount": 100000000000, "target": { "key": "8e4a870b118afde2a113940cdff3c79e01ce05ff7b65552c2ba944484db140d2" } }, { "amount": 800000000000, "target": { "key": "4d744e067f3e4da9e7bb08f3f7080f4ca043d2623efe5c534acd090db3a18e1a" } }, { "amount": 1000000000000, "target": { "key": "ba3e44b01b3b35624a39336763358b58f9db72131bff980c50aa1b65e0f30463" } }, { "amount": 1000000000000, "target": { "key": "72fba83740aabfed2cd983447d06ed44a594bd3397b5737fd98ccf8bf711ccec" } } ], "extra": [ 2, 33, 0, 177, 72, 75, 213, 183, 79, 168, 167, 205, 180, 89, 187, 51, 147, 249, 75, 190, 132, 204, 200, 238, 213, 9, 132, 110, 122, 65, 225, 118, 255, 41, 108, 1, 89, 157, 90, 84, 173, 170, 89, 62, 87, 150, 108, 77, 217, 1, 7, 176, 115, 140, 123, 14, 75, 38, 236, 115, 241, 251, 134, 32, 130, 28, 10, 245 ], "signatures": [ "dbdf53a936d1aa809271658982b1f7e5843336fd5eccdda0b937b05813b92b0a0249231dd70b1f054eabfb4312ad072908a5fda7e5869779bb099bf591b2270bceae17ed6b641e0cbd108d7568cc347d548042a386c6ca8b6589164a5080a00e140394b11016ef1e413e32f80ff1ebbeb3ba7bfff1c9433032a426d024da1e05", "05447e6256ab18afc5dc4dfbb9ca9112e0f815fb09ba4c748202d21c62ce7302e364e1a2db7d9cae93cb8f3dbcc408148caa2d6341e8d7fc2d51c7a1c52e600e4860a0a8f87d3fb7faf01154da3ef2617a94153294c2ca28ca34b67c9aef7708e5b31941ec8a7e87159a48314589ba35cb30475d60e16dc0685d96efa2179b00"] }


Less details
source code | moneroexplorer