Monero Transaction 30bba10bf65c5b9745fae5228877bf3bf262e5ecb6756b9ab53ade85a597887d

Autorefresh is OFF

Tx hash: 30bba10bf65c5b9745fae5228877bf3bf262e5ecb6756b9ab53ade85a597887d

Tx prefix hash: 169b332348ed50d9af0a86a883242dc8f50750b05cb1bbd0f63e82c5c6bb0b3c
Tx public key: d88efc5d8cf7d6cc6e96f14919c965f12f2f28ced45128bce880e051265ccc84
Payment id: 5c82fce3ba14b8ba15b4ba4474dde1682522c90e56635eab2b4e520e1aeb9088

Transaction 30bba10bf65c5b9745fae5228877bf3bf262e5ecb6756b9ab53ade85a597887d was carried out on the Monero network on 2014-07-22 23:20:08. The transaction has 3101512 confirmations. Total output fee is 0.007472500000 XMR.

Timestamp: 1406071208 Timestamp [UTC]: 2014-07-22 23:20:08 Age [y:d:h:m:s]: 10:063:03:41:48
Block: 140555 Fee (per_kB): 0.007472500000 (0.007378823529) Tx size: 1.0127 kB
Tx version: 1 No of confirmations: 3101512 RingCT/type: no
Extra: 0221005c82fce3ba14b8ba15b4ba4474dde1682522c90e56635eab2b4e520e1aeb908801d88efc5d8cf7d6cc6e96f14919c965f12f2f28ced45128bce880e051265ccc84

7 output(s) for total of 2.097527500000 xmr

stealth address amount amount idx tag
00: 08bdd0ef03141e5e0f9137de075e8699f1df68a251ffd124a8bb66550c30d2cf 0.000527500000 0 of 3 -
01: fe8786516b40506cd4a94a69b57ea1b862e24acdac11a526425de23a2a48d05d 0.007000000000 164064 of 247340 -
02: 3ea3908bb0a868681805433c06e239bd5f00ac3e7eea36dde4e4e69e43a36cb0 0.010000000000 316261 of 502466 -
03: 04e344c49de051f42aaac8097ed58020b6bc01e81e7ba94a3b23462365b9a8d4 0.080000000000 80947 of 269575 -
04: 7bcdb611e1360b0ae251b2947634dde07b83e683978dd9610b3576a511e06674 0.100000000000 308406 of 982315 -
05: 811c118f17945b5945e7f666257a9a0b043bd9a7bf39f361ab2ef6fea88c4594 0.900000000000 62578 of 454894 -
06: 429cb59df643692a9aabe04a6a3bd9e635fcc8edd4f56e2dd38941f4838b3329 1.000000000000 125989 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-28 18:02:08 till 2014-07-22 23:19:25; resolution: 0.32 days)

  • |___________________________________*_____________________________________________________________________________________________________________________________________*|
  • |________________________________________*________________________________________________________________________________________________________________________________*|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |___________________________________________________________________________________________*_____________________________________________________________________________*|

4 inputs(s) for total of 2.105000000000 xmr

key image 00: 31e23311be2727ec712bca7bed7a8b767897d4282c31eb0197f506a27d1a65cc amount: 0.006000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9db1ac53985a1261b956e556d60998276822b5497eb853c99076bb993731a7b6 00076940 1 4/288 2014-06-09 02:01:03 10:107:01:00:53
- 01: 8a8ce4b44042c43c98db4faecd2545a490ea26266fb0aef2a32be59318b7a7e9 00140464 2 2/8 2014-07-22 21:33:31 10:063:05:28:25
key image 01: 3a534f9b6ee6ac65c44bde1a9143e87b81ebae9c49955a481f06d83b53ba6f23 amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f48d63032601b5431662b1dec454c10e015da8a643ef3d03d35efaf80e5c2a18 00079233 1 4/128 2014-06-10 16:04:58 10:105:10:56:58
- 01: c88953bdc5b1a870d29777716bfb7bdde6baae47dc6bd14f46763f0fdfc3f5db 00140503 2 4/87 2014-07-22 22:14:27 10:063:04:47:29
key image 02: f6909a4e9f3c74d503bd855786e88e025f1e055bcb23477f641721ef935d2506 amount: 0.009000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 11893401d33b65ce4b768553a66d0b2ed28b8d55f8a44cc329c2c072a7b49c4c 00060750 1 37/171 2014-05-28 19:02:08 10:118:07:59:48
- 01: f60fa9415e0c5361bc1a22e3c78e53fc27cc19662f1c1b23bb416b455c5d4e12 00140505 2 3/7 2014-07-22 22:19:25 10:063:04:42:31
key image 03: b4eaa37e8a990a29d9d826f97d9ac3bd189d552a2fdefac9cbd3e54ca013b9e8 amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 143071ecffa13d17e52b67191fdc0cbdd541a433d14ecf23da65c626a6ace3a3 00103530 1 67/27 2014-06-27 07:55:13 10:088:19:06:43
- 01: 326cd3078c33884e302cee1c4dfcbb7b5ae9e329da65728781f234cc477ce208 00140469 2 2/4 2014-07-22 21:38:33 10:063:05:23:23
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 6000000000, "key_offsets": [ 68755, 104148 ], "k_image": "31e23311be2727ec712bca7bed7a8b767897d4282c31eb0197f506a27d1a65cc" } }, { "key": { "amount": 90000000000, "key_offsets": [ 32622, 54266 ], "k_image": "3a534f9b6ee6ac65c44bde1a9143e87b81ebae9c49955a481f06d83b53ba6f23" } }, { "key": { "amount": 9000000000, "key_offsets": [ 22903, 128609 ], "k_image": "f6909a4e9f3c74d503bd855786e88e025f1e055bcb23477f641721ef935d2506" } }, { "key": { "amount": 2000000000000, "key_offsets": [ 23334, 27081 ], "k_image": "b4eaa37e8a990a29d9d826f97d9ac3bd189d552a2fdefac9cbd3e54ca013b9e8" } } ], "vout": [ { "amount": 527500000, "target": { "key": "08bdd0ef03141e5e0f9137de075e8699f1df68a251ffd124a8bb66550c30d2cf" } }, { "amount": 7000000000, "target": { "key": "fe8786516b40506cd4a94a69b57ea1b862e24acdac11a526425de23a2a48d05d" } }, { "amount": 10000000000, "target": { "key": "3ea3908bb0a868681805433c06e239bd5f00ac3e7eea36dde4e4e69e43a36cb0" } }, { "amount": 80000000000, "target": { "key": "04e344c49de051f42aaac8097ed58020b6bc01e81e7ba94a3b23462365b9a8d4" } }, { "amount": 100000000000, "target": { "key": "7bcdb611e1360b0ae251b2947634dde07b83e683978dd9610b3576a511e06674" } }, { "amount": 900000000000, "target": { "key": "811c118f17945b5945e7f666257a9a0b043bd9a7bf39f361ab2ef6fea88c4594" } }, { "amount": 1000000000000, "target": { "key": "429cb59df643692a9aabe04a6a3bd9e635fcc8edd4f56e2dd38941f4838b3329" } } ], "extra": [ 2, 33, 0, 92, 130, 252, 227, 186, 20, 184, 186, 21, 180, 186, 68, 116, 221, 225, 104, 37, 34, 201, 14, 86, 99, 94, 171, 43, 78, 82, 14, 26, 235, 144, 136, 1, 216, 142, 252, 93, 140, 247, 214, 204, 110, 150, 241, 73, 25, 201, 101, 241, 47, 47, 40, 206, 212, 81, 40, 188, 232, 128, 224, 81, 38, 92, 204, 132 ], "signatures": [ "b9d9894b8ab16d55c58c72e70e68c681942638f5f03de0d9816721c6aa4cd10a69b5d33935cf999333beca178aa36c48f679c9c8e920cb38ff08a9ee0e8afb03e3edd9892d53bb76989fa4d87c13406c7c734b6b9b07d9c5e8d9f14744a94404b720abd68806cd6ba23f9c76f7118a226e1f2ad01bf0570a7613198ff9977d0d", "494283417d551a08d8c433a399e23c86587eff9d2261fbe9481c8036514f5d07de5d403874c04a01a25c40f23c32bb83de436ef0d51dcc912c7a21f882064004e927977fcd5eaf001f642b252de82676c0ce6494b2204d1f08d8653b4e391f0173305eb15cef88f029c7511e61b3c778ffcb98bd8bf3b583ab0acbb7dc16ee0a", "d3543787fd587ef89ffee103f3c5f9b2af89e630d77a6f96ffc87d299b851e044720800efdbe2bc867abf748ddbe62262e5b3a2d93c90e6db4bf0c3796dbc609e77def83c667bc6bf88997f0b6e3f16b45ebd8e86c86c4c9ea35463c1473090ba574971e104c2790906425aa820ca6717bfdadd0045a00120ceb488f18cccf07", "74d8f35cc56523bf933b012e21404899713b9e638f7e934798988f937bac470abc58c408aa9eb4c26a90ec691760f60cfadeef7892beea70c0969d8aa3df550df0ebb744917b234754186c98a9d313ad14e3061cb561d903b3beef7fc3d1f506e7100d7c4de2cc66bd98caa97cbc736b56919bc1969423d0511582296d4db10a"] }


Less details
source code | moneroexplorer