Monero Transaction 30d012f5dba8f166a58f843fbd00cd7e614ff6b06a6034fd92a4a0b3e1d90ba8

Autorefresh is OFF

Tx hash: 30d012f5dba8f166a58f843fbd00cd7e614ff6b06a6034fd92a4a0b3e1d90ba8

Tx prefix hash: 3ebaef5ac1b6ec1ec2e458e435d60cac5b3287e3dd02cbd9f3c61f9e9d95054f
Tx public key: 42cfe536f653395cb89bb23080e56e01b63129b1017882f7d1cf7ba4203455d3
Payment id: 989abebadea0928707976c01e2a9f363bc79e9406ab170e49173fa021e15c316

Transaction 30d012f5dba8f166a58f843fbd00cd7e614ff6b06a6034fd92a4a0b3e1d90ba8 was carried out on the Monero network on 2014-11-06 21:06:27. The transaction has 2997877 confirmations. Total output fee is 0.148071628715 XMR.

Timestamp: 1415307987 Timestamp [UTC]: 2014-11-06 21:06:27 Age [y:d:h:m:s]: 10:025:02:34:14
Block: 293741 Fee (per_kB): 0.148071628715 (0.402189251470) Tx size: 0.3682 kB
Tx version: 1 No of confirmations: 2997877 RingCT/type: no
Extra: 022100989abebadea0928707976c01e2a9f363bc79e9406ab170e49173fa021e15c3160142cfe536f653395cb89bb23080e56e01b63129b1017882f7d1cf7ba4203455d3

5 output(s) for total of 6.851928371285 xmr

stealth address amount amount idx tag
00: 1d1c53bdc5d10c810123f8cad34dc720fd1441e649912505f29c0e32d894ce31 0.051928371285 0 of 1 -
01: 0cc8a9b5683c600d3b4e8bd5b978e3c1c6016a8769d3fc00ed15c6c8d24eebfc 0.100000000000 621166 of 982315 -
02: e8e8bb22b9b4db77922737687794c847cf8be00453f337934596d290108c6803 0.700000000000 195973 of 514467 -
03: 6baa4d051fcbb73e51968b8021629b1119079ded2656adaa752a020724d5fd4f 1.000000000000 327586 of 874629 -
04: 5f9a4bcd78a99917fcbef80b1623bc097e25be401715ce8afd7bc58feb84a298 5.000000000000 121916 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-11-06 17:01:46 till 2014-11-06 19:01:46; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|

1 inputs(s) for total of 7.000000000000 xmr

key image 00: 40f6a5fca4253c2e7d37484da2bef9f6deaf699bcce7dd4a689a2bae268a3914 amount: 7.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 61f30a4bec6feb70c4fbdb5a56407f8c3cc5b6fd1d4bd3159f8350825ea1110c 00293556 1 5/7 2014-11-06 18:01:46 10:025:05:38:55
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 7000000000000, "key_offsets": [ 59875 ], "k_image": "40f6a5fca4253c2e7d37484da2bef9f6deaf699bcce7dd4a689a2bae268a3914" } } ], "vout": [ { "amount": 51928371285, "target": { "key": "1d1c53bdc5d10c810123f8cad34dc720fd1441e649912505f29c0e32d894ce31" } }, { "amount": 100000000000, "target": { "key": "0cc8a9b5683c600d3b4e8bd5b978e3c1c6016a8769d3fc00ed15c6c8d24eebfc" } }, { "amount": 700000000000, "target": { "key": "e8e8bb22b9b4db77922737687794c847cf8be00453f337934596d290108c6803" } }, { "amount": 1000000000000, "target": { "key": "6baa4d051fcbb73e51968b8021629b1119079ded2656adaa752a020724d5fd4f" } }, { "amount": 5000000000000, "target": { "key": "5f9a4bcd78a99917fcbef80b1623bc097e25be401715ce8afd7bc58feb84a298" } } ], "extra": [ 2, 33, 0, 152, 154, 190, 186, 222, 160, 146, 135, 7, 151, 108, 1, 226, 169, 243, 99, 188, 121, 233, 64, 106, 177, 112, 228, 145, 115, 250, 2, 30, 21, 195, 22, 1, 66, 207, 229, 54, 246, 83, 57, 92, 184, 155, 178, 48, 128, 229, 110, 1, 182, 49, 41, 177, 1, 120, 130, 247, 209, 207, 123, 164, 32, 52, 85, 211 ], "signatures": [ "4093acf77a307f318d89932094f9d86e3cfeb852e2d809fbc04e43ff2106340cd707b78e660885b65c0e7240ae4ca04a6e36b125d83cb69f156a79bc456b3d0e"] }


Less details
source code | moneroexplorer