Monero Transaction 30d0a729fe4cdb630fd798e1b7ba5598f01547a78283056af1b8c6031cdcbed5

Autorefresh is OFF

Tx hash: 30d0a729fe4cdb630fd798e1b7ba5598f01547a78283056af1b8c6031cdcbed5

Tx prefix hash: 03f908c51758211a3336e354b94468101d4172433e0403c6b17d5b9b2ff635e6
Tx public key: 1600e5592eb9bd5a17640333711704e9a79a855f2f13a7684c74763464224b9d
Payment id: 592b37b10abe0d15109799005351b873c002f2953c2f2403849537580a2d89bf

Transaction 30d0a729fe4cdb630fd798e1b7ba5598f01547a78283056af1b8c6031cdcbed5 was carried out on the Monero network on 2014-08-01 18:29:09. The transaction has 3123458 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1406917749 Timestamp [UTC]: 2014-08-01 18:29:09 Age [y:d:h:m:s]: 10:103:12:09:17
Block: 154697 Fee (per_kB): 0.010000000000 (0.031507692308) Tx size: 0.3174 kB
Tx version: 1 No of confirmations: 3123458 RingCT/type: no
Extra: 022100592b37b10abe0d15109799005351b873c002f2953c2f2403849537580a2d89bf011600e5592eb9bd5a17640333711704e9a79a855f2f13a7684c74763464224b9d

1 output(s) for total of 0.400000000000 xmr

stealth address amount amount idx tag
00: c7f03cc0b264210016c68762c759b597983d07f915593c77fb1360fb4a8d09d1 0.400000000000 127660 of 688584 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-08-01 14:33:24 till 2014-08-01 18:29:43; resolution: 0.00 days)

  • |_______________________________________________________________________________________________________________________________*__________________________________________|
  • |___________________________________________*______________________________________________________________________________________________________________________________|

2 inputs(s) for total of 0.410000000000 xmr

key image 00: dd4d2e254019ef65f0c731c0da40d451ac3543edef305a20b5cdcf11f4800b89 amount: 0.400000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 77fcdb9b58396d3b4be42463d91adde48cfee70f88e96c89cf9aff63b9a4bbc4 00154644 1 16/76 2014-08-01 17:29:43 10:103:13:08:43
key image 01: d39e22688405ababfb299f64e894f6a304422de56721e25da105c2ad072662f3 amount: 0.010000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f9a490c21252a9409e2f30addc604e517f4f4eca264bf419210f8d7de0e96d2e 00154530 1 3/3 2014-08-01 15:33:24 10:103:15:05:02
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 400000000000, "key_offsets": [ 127596 ], "k_image": "dd4d2e254019ef65f0c731c0da40d451ac3543edef305a20b5cdcf11f4800b89" } }, { "key": { "amount": 10000000000, "key_offsets": [ 322173 ], "k_image": "d39e22688405ababfb299f64e894f6a304422de56721e25da105c2ad072662f3" } } ], "vout": [ { "amount": 400000000000, "target": { "key": "c7f03cc0b264210016c68762c759b597983d07f915593c77fb1360fb4a8d09d1" } } ], "extra": [ 2, 33, 0, 89, 43, 55, 177, 10, 190, 13, 21, 16, 151, 153, 0, 83, 81, 184, 115, 192, 2, 242, 149, 60, 47, 36, 3, 132, 149, 55, 88, 10, 45, 137, 191, 1, 22, 0, 229, 89, 46, 185, 189, 90, 23, 100, 3, 51, 113, 23, 4, 233, 167, 154, 133, 95, 47, 19, 167, 104, 76, 116, 118, 52, 100, 34, 75, 157 ], "signatures": [ "2a0b59942d90dcc896b8f7a60d99352114fb6a09bee8bd30656e59c2c989bc0a94de4ba629a23151c22fe74b58db18609aece4e4b38af395bfc034594deed305", "644d0261c3746ac5bc581b8cba3e5e1f8011849f3c66246d0e8f665bd73df20c5ba046edcfb8825630f78253eb6e2e4baf20703112411a70b672c9ad3de7f701"] }


Less details
source code | moneroexplorer