Monero Transaction 3309b1ffed47388467d172cc61352369f6804e12058ae06784df6aa835968280

Autorefresh is OFF

Tx hash: 3309b1ffed47388467d172cc61352369f6804e12058ae06784df6aa835968280

Tx public key: ac08b00b0b68d6f323f96f3804ad4437d018c3a7812bfc0ad6869c1ef3bfa8e8
Payment id: 795738d8aa5a31adf2f27d19e4c89fe1948cd547f923bc0af0c7de1c3e4cd3d6

Transaction 3309b1ffed47388467d172cc61352369f6804e12058ae06784df6aa835968280 was carried out on the Monero network on 2015-04-03 13:22:58. The transaction has 2797810 confirmations. Total output fee is 0.109168305372 XMR.

Timestamp: 1428067378 Timestamp [UTC]: 2015-04-03 13:22:58 Age [y:d:h:m:s]: 09:257:18:51:31
Block: 504789 Fee (per_kB): 0.109168305372 (0.213336535689) Tx size: 0.5117 kB
Tx version: 1 No of confirmations: 2797810 RingCT/type: no
Extra: 022100795738d8aa5a31adf2f27d19e4c89fe1948cd547f923bc0af0c7de1c3e4cd3d601ac08b00b0b68d6f323f96f3804ad4437d018c3a7812bfc0ad6869c1ef3bfa8e8

6 output(s) for total of 20.690831694628 xmr

stealth address amount amount idx tag
00: 8eaabcc830c4822d3efc24222651b97468c78e2de66c08507c57a866736c7017 0.090831694628 0 of 1 -
01: ab95980f9adfb5eaec1502b3176eb4be5cc643dc234680465b1a4739fb262ee5 0.700000000000 285929 of 514467 -
02: 74a89f88cbccc5d84449f3cf43c109eda59cd673e2d8014ad5acaea2fad2fca9 0.900000000000 229597 of 454894 -
03: f8335aa16c62c0b1ba2b25d097399076bec2f80e15a02e6871a00b92e663b894 3.000000000000 184633 of 300495 -
04: 59a2ddab622ff519509db22ebd39227ff3f448af3c4ce82a35bbaf5acfb2cf5c 6.000000000000 104738 of 207703 -
05: bca7ed030b4ea63f2c519a5af04197f5bb4b6a009addfae662e905784dae3dd1 10.000000000000 578405 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 20.800000000000 xmr

key image 00: 543de0fc05ad5c05aea81994ded79b8a227b8a3986497cdbcb1901d6796b2499 amount: 0.800000000000
ring members blk
- 00: 7bcd0a1b9e8dfb53a99d3ae264ae720515c86e84fd312b8ef0a241728ff37d24 00502578
key image 01: cd47e468647308724d2f011b5710ec413549ba0ac86357b696c52b6f879a9038 amount: 20.000000000000
ring members blk
- 00: 309529177a0b4563fc6e600171622ca60c6eaab09c6bb24bd98bf497ddd6f3ed 00504583
More details
source code | moneroexplorer