Monero Transaction 309058f85d6b4389a9082876b041a81fb2a90c4bab8568bae0e56bf3ae73f340

Autorefresh is OFF

Tx hash: 309058f85d6b4389a9082876b041a81fb2a90c4bab8568bae0e56bf3ae73f340

Tx prefix hash: ad2c11edee7eb5d11445ad5d61ef21390615c9059b46da201ef93ae9fd4d5529
Tx public key: 0178e94adadef970fd8a03f9e5c2fa48a91938d37e1490ce9c3933b8b480f331

Transaction 309058f85d6b4389a9082876b041a81fb2a90c4bab8568bae0e56bf3ae73f340 was carried out on the Monero network on 2014-09-02 17:50:21. The transaction has 3102497 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1409680221 Timestamp [UTC]: 2014-09-02 17:50:21 Age [y:d:h:m:s]: 10:106:07:30:43
Block: 200628 Fee (per_kB): 0.100000000000 (0.177162629758) Tx size: 0.5645 kB
Tx version: 1 No of confirmations: 3102497 RingCT/type: no
Extra: 010178e94adadef970fd8a03f9e5c2fa48a91938d37e1490ce9c3933b8b480f331

6 output(s) for total of 3.900000000000 xmr

stealth address amount amount idx tag
00: 418e4f42a09c04c358353faf22630adb0c19693b5cb1c7dba5d1f919725225a4 0.200000000000 432959 of 1272211 -
01: e9c12295e1a499d10e56804499aaed49e02525907d1cb1a24be8f1e21e2cffd5 0.200000000000 432960 of 1272211 -
02: 96b0454c6117346fea9716234c39d379a20fc862353b64ef1ab1c54301f6f490 0.600000000000 184894 of 650760 -
03: c1010c91223f249be49577e3f242705c9bc8e32e6470245b179bdc4050c92c14 0.900000000000 110443 of 454894 -
04: 7706bcff2a8c88acd108d19b38769c16a23d24673234542edc0c2572334526e4 1.000000000000 232595 of 874630 -
05: e3743bbba820cbe19d713ffb8dce25a338edfb01f28d50bed08fce9065e1601a 1.000000000000 232596 of 874630 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-11 20:04:16 till 2014-09-02 17:46:05; resolution: 0.49 days)

  • |_*_________________________________________________________________________________________________________________________*__________*__________________________________*|

1 inputs(s) for total of 4.000000000000 xmr

key image 00: df0c227787a63042639e3d5d1b9d5d7eb77150475f69c1baf8dbc3c889853a70 amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0d7a71dccaa1c8615906159de4d0c9f4d61ecc8f35417cda62a29a11a828faf5 00080987 1 9/140 2014-06-11 21:04:16 10:189:04:16:48
- 01: d69624ad4de878dc785281cef60a0c8f8a29a605e90925acb941196aebaa402a 00167562 1 7/3 2014-08-10 18:26:33 10:129:06:54:31
- 02: 82c5916c27cc9c8ac5f919099ee0d778712768c7a9f98b08ab7163712c5e645b 00175781 0 0/6 2014-08-16 11:15:17 10:123:14:05:47
- 03: 30bf616ab845df47862b7527884fe2c373d844465134b068eb3ce8e896f6c470 00200555 0 0/4 2014-09-02 16:46:05 10:106:08:34:59
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 4000000000000, "key_offsets": [ 6565, 28548, 7908, 29124 ], "k_image": "df0c227787a63042639e3d5d1b9d5d7eb77150475f69c1baf8dbc3c889853a70" } } ], "vout": [ { "amount": 200000000000, "target": { "key": "418e4f42a09c04c358353faf22630adb0c19693b5cb1c7dba5d1f919725225a4" } }, { "amount": 200000000000, "target": { "key": "e9c12295e1a499d10e56804499aaed49e02525907d1cb1a24be8f1e21e2cffd5" } }, { "amount": 600000000000, "target": { "key": "96b0454c6117346fea9716234c39d379a20fc862353b64ef1ab1c54301f6f490" } }, { "amount": 900000000000, "target": { "key": "c1010c91223f249be49577e3f242705c9bc8e32e6470245b179bdc4050c92c14" } }, { "amount": 1000000000000, "target": { "key": "7706bcff2a8c88acd108d19b38769c16a23d24673234542edc0c2572334526e4" } }, { "amount": 1000000000000, "target": { "key": "e3743bbba820cbe19d713ffb8dce25a338edfb01f28d50bed08fce9065e1601a" } } ], "extra": [ 1, 1, 120, 233, 74, 218, 222, 249, 112, 253, 138, 3, 249, 229, 194, 250, 72, 169, 25, 56, 211, 126, 20, 144, 206, 156, 57, 51, 184, 180, 128, 243, 49 ], "signatures": [ "da39ef2c45660c6f68a44ad2613190cfcab49bfed819e7f0ea4315b61fb733086987e2f05d624bbce6a5f0a4362d925d56a17b19f416c5b55c4a46c1f8efc10802b5d45dcb93a7d1508ba0f0d1ac18a1ef0d920fdcc06236b95b19dd5a0f810f62b8b1126a75d60f4a39f2e2d5b61f039b09dcc553aa8c832c0df6e3d753d90d47997224822b4ea75e192870726a5ddcaf8a3fc2813b41e04ee1b74f38af030fa007e91b71dcd64a3d7d9e804f87e278c9b01a5e55ebd2739245e4bc45c8390ac06ff937c093cb163369aa3a16251504834a8ca60aa9c3e85feea1adfc651f02be35747234d1f775bd6bb9ec5e7f0d91a64faea6b25290b2a89125a97991ba04"] }


Less details
source code | moneroexplorer