Monero Transaction 30fd4df2d5900ffa9293a6829fe49eb059e428491bc64ff2a309a28760ab91c1

Autorefresh is OFF

Tx hash: 30fd4df2d5900ffa9293a6829fe49eb059e428491bc64ff2a309a28760ab91c1

Tx public key: c7c1b1259a8b1b51483d2ff3d20a113f7fd7cec39b95aac7f81fdfb29e12529d
Payment id: 293b8fba499cbdbfdd5088ec7500719bca79c0db77db3de73eeda602797353aa

Transaction 30fd4df2d5900ffa9293a6829fe49eb059e428491bc64ff2a309a28760ab91c1 was carried out on the Monero network on 2014-10-11 15:12:34. The transaction has 3049388 confirmations. Total output fee is 0.127987804419 XMR.

Timestamp: 1413040354 Timestamp [UTC]: 2014-10-11 15:12:34 Age [y:d:h:m:s]: 10:071:01:33:33
Block: 256390 Fee (per_kB): 0.127987804419 (0.112690895722) Tx size: 1.1357 kB
Tx version: 1 No of confirmations: 3049388 RingCT/type: no
Extra: 022100293b8fba499cbdbfdd5088ec7500719bca79c0db77db3de73eeda602797353aa01c7c1b1259a8b1b51483d2ff3d20a113f7fd7cec39b95aac7f81fdfb29e12529d

6 output(s) for total of 21.425492170000 xmr

stealth address amount amount idx tag
00: 053f89af8e65837c377a8fa66dded49cc3a4be15ffe2dfc51b461d2e03fe2549 0.025492170000 0 of 1 -
01: dbde73413c5619ba8050eefe57cf3a7367400d49aac1355a23e2920ad818f2e4 0.500000000000 373432 of 1118624 -
02: 334c91c5e5a441e3c3bf94f6cfcf7192025550bd09d26f30c4fdd89f6b7d1f4e 0.900000000000 143253 of 454894 -
03: 9c24b71c1e4038fa14714cddc35d261307c8e6e639f5b3144ddd5797730c207a 1.000000000000 299171 of 874630 -
04: 9801b21c13d2b13ffb2347a16c4ba8a62378e0e6bf0a2d949eae02bd755152b9 9.000000000000 23186 of 274259 -
05: ba4d78ba8eae2bdb7c8edff2298f4b3d8c618bbed12f9a8794e1c7d2753362d1 10.000000000000 298710 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



8 inputs(s) for total of 21.553479974419 xmr

key image 00: 82579092ac7f8144bcc2ac73150b35af196ced04b3edf4c1458c511362bcef68 amount: 0.053479974419
ring members blk
- 00: 2a6a331400bd1542ba737479192dcc93845c43c499fcf55acbc5878aa4886dc8 00230552
key image 01: 59c93d4f766280f2ab0b35ffdbcfe94df9a7c7c5f03ec3fc70be2b1cb2635e4d amount: 0.800000000000
ring members blk
- 00: e0fd25102cd5954bded95ec293c09923bcd8f2cd96560e642d86225c1fa080fe 00255968
key image 02: b6d122427aa35643ca17fff9c68af932d57a7caaa1f5aeb341fb89d83867a1cb amount: 1.000000000000
ring members blk
- 00: 3fcb860d635921b9e98b265fe323f3c03f66d4ace4eb0e37ee7d6b6c60d95a29 00255585
key image 03: 92f340c56a1da51edffc0b3d8f9b567ffc54aa76922c1c28eacc34f90595e813 amount: 3.000000000000
ring members blk
- 00: 7ce42fc8acca4fe0a17b616cc9844a0eb02371478dc7e970eaeb7e433d3cd97e 00256034
key image 04: 426709dbd5d12869dae404cd46a742e97d8621e0a1b16dfc873a9f53f23f64d3 amount: 3.000000000000
ring members blk
- 00: 8fd4f6186bfcb6e10b4f69e993c0740994623a5158637d42a37c8a5320435dbb 00255695
key image 05: 9fe8c1a4a5f173976df532211d8e5db9bfb9009f6cb53078640984996ae1416a amount: 0.700000000000
ring members blk
- 00: e63da4f320be65c8d138bce5bb6db530e924f0a38ca1c56857b87167663da248 00256311
key image 06: 965f0888fb58d835aa9d4dba5d5c22621bf52bff5aae52de2072850eba3881cc amount: 3.000000000000
ring members blk
- 00: 5ccc55aae5cd20ff33b9d6e244f1dab06901b9ed940731cd6c5b5b0f2fcd2d56 00255338
key image 07: e439191fa0010b795afd44c20fb5c3f59895831fd6c2d03fec8ef3565f1f9dba amount: 10.000000000000
ring members blk
- 00: bad6ba2776391f81c2f190e18382988032c01100bb24c0d46f6930b6ba8189b2 00255353
More details
source code | moneroexplorer