Monero Transaction 30ef8697bae84eb24050e18bf894332050b43daa8cae26739ce4075b068491f3

Autorefresh is OFF

Tx hash: 30ef8697bae84eb24050e18bf894332050b43daa8cae26739ce4075b068491f3

Tx prefix hash: 87d6348829f07ee86e6ae4dd468b438541a9110f61814956308b7dda3daa7242
Tx public key: d667f4d6adbb8f59268a0b753a92f9e5d6c7c34ee10cfd9e4ef2e55d6ca389e0
Payment id: d02724387e164e54ad78ec5f609526ea49feafbc82a243b297df0ce2900cb126

Transaction 30ef8697bae84eb24050e18bf894332050b43daa8cae26739ce4075b068491f3 was carried out on the Monero network on 2016-08-02 06:31:06. The transaction has 2191497 confirmations. Total output fee is 0.010000600000 XMR.

Timestamp: 1470119466 Timestamp [UTC]: 2016-08-02 06:31:06 Age [y:d:h:m:s]: 08:126:20:09:22
Block: 1104504 Fee (per_kB): 0.010000600000 (0.013764266667) Tx size: 0.7266 kB
Tx version: 1 No of confirmations: 2191497 RingCT/type: no
Extra: 022100d02724387e164e54ad78ec5f609526ea49feafbc82a243b297df0ce2900cb12601d667f4d6adbb8f59268a0b753a92f9e5d6c7c34ee10cfd9e4ef2e55d6ca389e0

5 output(s) for total of 39.990000000000 xmr

stealth address amount amount idx tag
00: 53e941bfa33a498731f8df8d8219f2e873411fcf04528846af9e3ec015972d5e 0.090000000000 243037 of 317822 -
01: db42bea26c3857896cf6f3fd10816740514b7e8813e32fa605b7742f061b12e7 0.900000000000 380969 of 454894 -
02: dde1c2d54450b914572503c80800681a87c76e797b9b35b5a29b59b13ec3dc9d 9.000000000000 188275 of 274259 -
03: 12a9e0bdd6eb9c292072a4255f1a1c16d602c7c334f56b093c26e10bde94b853 10.000000000000 822853 of 921411 -
04: e71a441e4e02ed6ce2a2b3d93c94664b1fdb49a69118696dac2f0db65346e888 20.000000000000 59156 of 78991 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-07-26 14:30:44 till 2016-08-02 04:51:08; resolution: 2.19 days)

  • |_____________________________________________________________________________________________________________________________________________________________**_________*_|
  • |_*__________________________________________________________________________*____________________________________________________________________________________________*|

2 inputs(s) for total of 40.000000600000 xmr

key image 00: 21ccb94c9446cb76db5969b05dd97c5a1b2c98a0095af678fdb6a8435b592a6d amount: 0.000000600000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 036ffc2e06d8f3a809750d7057170c5db61d153183a3749a68bf15ecc61c3554 01084786 3 2/25 2016-07-05 19:14:51 08:154:07:25:37
- 01: 972c0c7eb359053e1a80ec65f075805c29baa80cb2b8c9db48cfc4c4181e44bc 01086849 3 2/25 2016-07-08 15:01:43 08:151:11:38:45
- 02: 769b0f0200683f3d7153e5cd1f61dde9cb12d56aee9e199d94618a16aa62840d 01102513 3 2/22 2016-07-30 10:51:10 08:129:15:49:18
key image 01: dfa3c2141ce518fc7bf15725a74d635f7756eec2ba0c3f43acc2797ca6cbd7b3 amount: 40.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 484e99b64532e96da1e995a5ff59b4f40527fb044dc6b07817fce972d3fb24b6 00667918 1 4/5 2015-07-26 15:30:44 09:134:11:09:44
- 01: eef5b95120f5d9a63518cf38a539bc6994b4ca37131b12c7abf2531f56330f2d 00905706 1 2/10 2016-01-10 02:41:27 08:331:23:59:01
- 02: efc4ec07db4e2d7050a72366d4beede00df27124077319cb15546c8d0d37d15a 01104422 3 8/4 2016-08-02 03:51:08 08:126:22:49:20
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 600000, "key_offsets": [ 3377, 87, 506 ], "k_image": "21ccb94c9446cb76db5969b05dd97c5a1b2c98a0095af678fdb6a8435b592a6d" } }, { "key": { "amount": 40000000000000, "key_offsets": [ 16072, 4751, 8116 ], "k_image": "dfa3c2141ce518fc7bf15725a74d635f7756eec2ba0c3f43acc2797ca6cbd7b3" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "53e941bfa33a498731f8df8d8219f2e873411fcf04528846af9e3ec015972d5e" } }, { "amount": 900000000000, "target": { "key": "db42bea26c3857896cf6f3fd10816740514b7e8813e32fa605b7742f061b12e7" } }, { "amount": 9000000000000, "target": { "key": "dde1c2d54450b914572503c80800681a87c76e797b9b35b5a29b59b13ec3dc9d" } }, { "amount": 10000000000000, "target": { "key": "12a9e0bdd6eb9c292072a4255f1a1c16d602c7c334f56b093c26e10bde94b853" } }, { "amount": 20000000000000, "target": { "key": "e71a441e4e02ed6ce2a2b3d93c94664b1fdb49a69118696dac2f0db65346e888" } } ], "extra": [ 2, 33, 0, 208, 39, 36, 56, 126, 22, 78, 84, 173, 120, 236, 95, 96, 149, 38, 234, 73, 254, 175, 188, 130, 162, 67, 178, 151, 223, 12, 226, 144, 12, 177, 38, 1, 214, 103, 244, 214, 173, 187, 143, 89, 38, 138, 11, 117, 58, 146, 249, 229, 214, 199, 195, 78, 225, 12, 253, 158, 78, 242, 229, 93, 108, 163, 137, 224 ], "signatures": [ "131bca1bee5963f6c91c7dae90cc60be5858f56a8e5777d7d272bc467d3e710dd5268ffa059b1be90520797c422c92e60dc273640eeb1cb62360c6bce96a1c0cd6fe9249f249fbbce411ffa5832e09346ec657139ca851da98cb5942846339094839bdd4f3c05b1a55687f8bb68ca48986f767c580c41c353870730e744d7f0f234841ceaf37acb24a5f527deca88673be08cfa903a9d9710e0c32f14018c20c65804e1f6384768e01d5a41763897097b9bebb1fa5be111e0a48145efc021b05", "b587e1dd02e14ca0fde5a95a882af204f8f43660c21c9231534ab05710eb640107870c9eeabb724e580d822286ac01fa0bc0ce36df197566aebf8eecc76ec009c72acc4899a26da8ce38fd3dd6f6d235c8d90001b1742cf9af9823480446700d3f0be0c668338231ba9d3b641ebd410532ee34c03e5cc03f6822bb53e9570005eef24d439bcf615acb683fe119c70049189a7ce87a55a04fc2ac93a7300e0e01dbf19818c1dc0f4813de0910f9b60a0374e9aa2992208320c5a93df583402f08"] }


Less details
source code | moneroexplorer