Monero Transaction 30c47a173420d019d8b9f0239540f671d94566bbceced74a215eebe4c4e17024

Autorefresh is OFF

Tx hash: 30c47a173420d019d8b9f0239540f671d94566bbceced74a215eebe4c4e17024

Tx prefix hash: 9120643410262ca68732fe37d27d7397564dbd2593aa151033fb5bd9b1d94508
Tx public key: 217ffe61068de9768ad72f4f29def44f69ae498a9e34b5fd0905c5adc858923d
Payment id: 8008b42891e705768e2a5cb6b2369c6fe2677ce89d083385e859ff968db34bb6

Transaction 30c47a173420d019d8b9f0239540f671d94566bbceced74a215eebe4c4e17024 was carried out on the Monero network on 2014-08-15 22:14:34. The transaction has 3127445 confirmations. Total output fee is 0.005034730000 XMR.

Timestamp: 1408140874 Timestamp [UTC]: 2014-08-15 22:14:34 Age [y:d:h:m:s]: 10:123:03:34:45
Block: 174973 Fee (per_kB): 0.005034730000 (0.004615544781) Tx size: 1.0908 kB
Tx version: 1 No of confirmations: 3127445 RingCT/type: no
Extra: 0221008008b42891e705768e2a5cb6b2369c6fe2677ce89d083385e859ff968db34bb601217ffe61068de9768ad72f4f29def44f69ae498a9e34b5fd0905c5adc858923d

9 output(s) for total of 11.634965270000 xmr

stealth address amount amount idx tag
00: e2a61df1d5028b9cd448852ab0c541de1a4263528fb191757a1499abfedff8a7 0.000965270000 1 of 2 -
01: fe3de5e489932080a140952e0b841203cb6248d7ec9933891c839b497248d5e0 0.006000000000 184131 of 256624 -
02: 206ef117aa92f057e3fee75033ca1b542aabc0a6101fcca8d7ea30cd729eb3f2 0.008000000000 167935 of 245068 -
03: 88486b30405167ba786762de0aa767358b63786bb14ea76479f30a6537f9ded7 0.010000000000 332466 of 502466 -
04: 65be715bcbb322049af3481eb1ad4d01e56a37d78445ee2b908379fd520af3e7 0.010000000000 332467 of 502466 -
05: 00e78b3c90dba5b160cfa1fd5c3fed088075ec5eff24fd3829515bd3f01531be 0.100000000000 429191 of 982315 -
06: 903e2e4e997d3669086cc200f2b26418cf425d1bac244f65b883060514ad25c7 0.500000000000 229679 of 1118624 -
07: 5169021fb7e3b9b50627c0ed89efc0eb7540ae179fa2e91fed3de68cfa791111 5.000000000000 104158 of 255089 -
08: 87302cbb0e75517b13c5cf6aa374117ffa72791178e23a245cc1730dce8dd807 6.000000000000 75908 of 207703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-12 02:33:02 till 2014-08-15 22:46:41; resolution: 0.56 days)

  • |______________________________________________________________________________________________________________________*__________________________________________________*|
  • |____________________________________________________________________________________*____________________________________________________________________________________*|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |____________________________________________________________________________________________________*____________________________________________________________________*|

4 inputs(s) for total of 11.640000000000 xmr

key image 00: 1c03e9a0c6bc5442307b885ae35f6e4f988f1492614b8749e413e897b70326bb amount: 0.700000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: fb802055fcaf536f074102a914c2f6ad36fe53f3299afa6c51a1cf5e788023a6 00132935 1 15/62 2014-07-17 16:10:36 10:152:09:38:43
- 01: 65abcef56d50f8ef783020dbc03b4e0fafa3c944840d777cbd8165d3b683ffa7 00174947 2 4/7 2014-08-15 21:46:41 10:123:04:02:38
key image 01: d4dab7ec14441d4794c7a772bdf76c7cb9f65b55abf1a1456d867e086bb61ebb amount: 0.040000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 2ae6fe186a98ccb7efffa5f57ec29d9bdf5820d53d01825cae618c33dfe14f96 00105173 0 0/6 2014-06-28 10:44:45 10:171:15:04:34
- 01: 7a876f06bcb186a5ce691bf9095efcdee846730a8a13b471342fc2bcd28b8fdc 00174871 2 3/7 2014-08-15 20:14:41 10:123:05:34:38
key image 02: 1f6c47d899c295d3676e92ee1ab3d4a9a19d1bab5a35ca1ec205781b99a9b351 amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 63747879dd8f0cd3d089938151e5b2bc9e29dae09b03654b11eb88fd5122c38a 00035789 0 0/8 2014-05-12 03:33:02 10:218:22:16:17
- 01: 0281d28b1d211a79a24813917e2819f3d4bb8002fa07108dc48101df186072a7 00174794 0 0/5 2014-08-15 18:57:01 10:123:06:52:18
key image 03: 172957091ec2e01d35462ddbc2d52f938feb14ff8f75cbfb90592b535f059ff2 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1d8324046aaf278a523a399e9ff07466f0ae0e4cd90563b8b0acb26ba0a26aba 00118714 0 0/6 2014-07-07 19:22:42 10:162:06:26:37
- 01: 86c6b05bc2389828dfdf8867a3062c8490bb73a04465578a45073e9e76ad0dc8 00174575 0 0/6 2014-08-15 14:52:16 10:123:10:57:03
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 700000000000, "key_offsets": [ 70192, 39157 ], "k_image": "1c03e9a0c6bc5442307b885ae35f6e4f988f1492614b8749e413e897b70326bb" } }, { "key": { "amount": 40000000000, "key_offsets": [ 115417, 20406 ], "k_image": "d4dab7ec14441d4794c7a772bdf76c7cb9f65b55abf1a1456d867e086bb61ebb" } }, { "key": { "amount": 900000000000, "key_offsets": [ 355, 91365 ], "k_image": "1f6c47d899c295d3676e92ee1ab3d4a9a19d1bab5a35ca1ec205781b99a9b351" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 132616, 68532 ], "k_image": "172957091ec2e01d35462ddbc2d52f938feb14ff8f75cbfb90592b535f059ff2" } } ], "vout": [ { "amount": 965270000, "target": { "key": "e2a61df1d5028b9cd448852ab0c541de1a4263528fb191757a1499abfedff8a7" } }, { "amount": 6000000000, "target": { "key": "fe3de5e489932080a140952e0b841203cb6248d7ec9933891c839b497248d5e0" } }, { "amount": 8000000000, "target": { "key": "206ef117aa92f057e3fee75033ca1b542aabc0a6101fcca8d7ea30cd729eb3f2" } }, { "amount": 10000000000, "target": { "key": "88486b30405167ba786762de0aa767358b63786bb14ea76479f30a6537f9ded7" } }, { "amount": 10000000000, "target": { "key": "65be715bcbb322049af3481eb1ad4d01e56a37d78445ee2b908379fd520af3e7" } }, { "amount": 100000000000, "target": { "key": "00e78b3c90dba5b160cfa1fd5c3fed088075ec5eff24fd3829515bd3f01531be" } }, { "amount": 500000000000, "target": { "key": "903e2e4e997d3669086cc200f2b26418cf425d1bac244f65b883060514ad25c7" } }, { "amount": 5000000000000, "target": { "key": "5169021fb7e3b9b50627c0ed89efc0eb7540ae179fa2e91fed3de68cfa791111" } }, { "amount": 6000000000000, "target": { "key": "87302cbb0e75517b13c5cf6aa374117ffa72791178e23a245cc1730dce8dd807" } } ], "extra": [ 2, 33, 0, 128, 8, 180, 40, 145, 231, 5, 118, 142, 42, 92, 182, 178, 54, 156, 111, 226, 103, 124, 232, 157, 8, 51, 133, 232, 89, 255, 150, 141, 179, 75, 182, 1, 33, 127, 254, 97, 6, 141, 233, 118, 138, 215, 47, 79, 41, 222, 244, 79, 105, 174, 73, 138, 158, 52, 181, 253, 9, 5, 197, 173, 200, 88, 146, 61 ], "signatures": [ "ecedd9ce261d0e31ed75273e540fd0753534358f56042c56a0413a44aca6300e69032013fa90bb8d4a388bf6b181e5ffcacf189421bd4cad878439fd847d97063b99221d6f17e7933a9a68a15247527520b6ac42a8a3539fd563e83fd5a11e0cffdda5fe78a87c818a00ff0a404d4df4e206771a291efc2101cbfdfeeb1dcd04", "45b6691c7af38179fe8cd7443bcd46f2fc7813ee5b999b6dc423c49a5d0dc402bac94ad48ce18b8de387261fc574f69794e828a540a7c1af7ba8896b60237c070cc1ef5e9c9caa9853a43942419a9f652b81b102ee0c45da96a2f9245bb3e80798157f9fab4c649a3864c670e5f9c353f0b816797391039d88862a331ac66506", "6a160fc64ec01443b354ea4990c2a764dc5cc03b3949afe1ea08fd6f5ea18f0390a0722c9b75ea1ecb8e19154acedfb51c0c979f9eca65984e0b6b4f3f9bfe0108c2391fc1d2f8a092a375310e4d4abb445104cb0fb3ed83ec4a6250ccf14e050ce2ab7cd7dd15b46eb24ebc8e56f5859377f495886e7a9b2128400c4149c202", "1a58d3440fb97662ae3bd945e2dbe3e2fec35912ae8cffdf14441e77312efc01f18b054b509bd5f5ea82617fa254a1315988471279eb226e987e6e008292e1098e75e67573f25e0259d29f325073dbf8a7c04f7e4217f92bacdd2c405e81020dfabe8f9731a2b0ba3687daebe6634569d9c50ffeaf039781b1d835ce7b8c7804"] }


Less details
source code | moneroexplorer