Monero Transaction 339e1c10df7a82595c1925e0d9d067a802f6ae843bfbfe639c699afc7c35e5b2

Autorefresh is ON (10 s)

Tx hash: 339e1c10df7a82595c1925e0d9d067a802f6ae843bfbfe639c699afc7c35e5b2

Tx public key: 4e9119f2df3ce8542eefe34e50d5907ef8962f24bc4781e8a5050a32568fa194
Payment id: f309f829cb04eabaebc089744c1b3d9119db4f87d78ddefd477ccb607f95b02b

Transaction 339e1c10df7a82595c1925e0d9d067a802f6ae843bfbfe639c699afc7c35e5b2 was carried out on the Monero network on 2014-08-16 09:39:03. The transaction has 3129432 confirmations. Total output fee is 0.005754690688 XMR.

Timestamp: 1408181943 Timestamp [UTC]: 2014-08-16 09:39:03 Age [y:d:h:m:s]: 10:126:09:46:46
Block: 175689 Fee (per_kB): 0.005754690688 (0.006440222147) Tx size: 0.8936 kB
Tx version: 1 No of confirmations: 3129432 RingCT/type: no
Extra: 022100f309f829cb04eabaebc089744c1b3d9119db4f87d78ddefd477ccb607f95b02b014e9119f2df3ce8542eefe34e50d5907ef8962f24bc4781e8a5050a32568fa194

8 output(s) for total of 5.905245309312 xmr

stealth address amount amount idx tag
00: 92da69471eab877a7d5a9d62e2cfa3cb53d74fa0786ae46ecd40caff198cadd2 0.000245309312 0 of 1 -
01: add72a79f9a5efd6569c1f0bb96990232023dc3c505c8808b6c90e0de0c490d6 0.006000000000 184371 of 256624 -
02: 2b48bdc64c64c898c136be9e7c3f75701b920ce7f4053ea2bf4e9f03222a01df 0.009000000000 162587 of 233398 -
03: c88ace3b240cec25535a8e2356fb4c214605fe82d16414d650fadf191475fd7f 0.090000000000 106042 of 317822 -
04: 24a659e2683ede76344a27dd500a31d507ed015cb00d4d7b3d365605269982ae 0.200000000000 371524 of 1272211 -
05: bdfbcf59f1a3cb0f8f8225d062df8fe93ad5c8da07852c0e3fc84a629e933ceb 0.600000000000 151838 of 650760 -
06: 7b0579119b1fd3e770ae617726012273a8bae6adeecabce01c91e813fd019e7d 1.000000000000 194084 of 874630 -
07: 047c5b928dd40e6f228eda5c0f7869e92298b121cf9b1f554e4ff710b6205eda 4.000000000000 42915 of 237197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



5 inputs(s) for total of 5.911000000000 xmr

key image 00: 6a4ef84fde731dc1e9f5d6e3be8ef6467d9d0c08bf6046dd552b61f271ddc661 amount: 0.005000000000
ring members blk
- 00: 914d34f443125f619962e471e1df2e6c23b892029e1557617eb18c59e89dbb4a 00175670
key image 01: 75e92ae2569f470acaff98f53d700988091f93c0386091d8684ffc65fda43e68 amount: 0.600000000000
ring members blk
- 00: ec8bb8cbd67dbab3a202441358c15ad829aee325a6046ee2413b383f6a8f0607 00175450
key image 02: 06929e0c3eb7c958c932f849bc395869d1e2d6c3d8775bd796ed0c46ca208dfa amount: 0.300000000000
ring members blk
- 00: 67555001b3e94f084e9b035e84ba9fdc739ef99d1ff1cecd35712018b47a915b 00175284
key image 03: f7e63c21b9c83830981ad479dc7f8d1ba360c343bf6b98b9b54ac5d49ba0231d amount: 0.006000000000
ring members blk
- 00: 411e7c584404d05dbc616bc026003c326ced8e345a7e30ec0a9d80b4ca7ac57c 00175450
key image 04: c67e30bbd1740695b0179e9f0c7cc79c599ffddafd07b8802c0c4ebf161b5dc9 amount: 5.000000000000
ring members blk
- 00: b0d902b8f1ed5e18764b14974ecce9d410368520f61fbf61f51b271dcbf383e2 00175153
More details
source code | moneroexplorer