Monero Transaction 340b6f5faf2755a96c57f3ecd62e6f39290ceafb80ba122d867a182da77df74f

Autorefresh is OFF

Tx hash: 340b6f5faf2755a96c57f3ecd62e6f39290ceafb80ba122d867a182da77df74f

Tx public key: 964961228b929e1485482f34ebe66ed4ea58e5c410b354bc8dcd89143e3bf6d7
Payment id: 9663ac4ef7a75c9d171f542aeeef70d0a24d9eff7081c617936220180078c77a

Transaction 340b6f5faf2755a96c57f3ecd62e6f39290ceafb80ba122d867a182da77df74f was carried out on the Monero network on 2014-10-19 09:36:06. The transaction has 3028507 confirmations. Total output fee is 0.185888629509 XMR.

Timestamp: 1413711366 Timestamp [UTC]: 2014-10-19 09:36:06 Age [y:d:h:m:s]: 10:049:13:11:26
Block: 267403 Fee (per_kB): 0.185888629509 (0.301663956604) Tx size: 0.6162 kB
Tx version: 1 No of confirmations: 3028507 RingCT/type: no
Extra: 0221009663ac4ef7a75c9d171f542aeeef70d0a24d9eff7081c617936220180078c77a01964961228b929e1485482f34ebe66ed4ea58e5c410b354bc8dcd89143e3bf6d7

6 output(s) for total of 18.914111370491 xmr

stealth address amount amount idx tag
00: 02d6d9b3c7b3c1c13d8b92a9ea1805e9ed8aff9b29293c1c675cff57b69ba3fe 0.014111370491 0 of 1 -
01: 76d1ec53893140fffb8237902c744b7fcba1ee3db2962ac96cdea472046b21ec 0.400000000000 246643 of 688584 -
02: 9f984e027ae8f81875d6c5730d7ec3ce3afc27c0544ddd2f535f67e01b8650b3 0.500000000000 389590 of 1118624 -
03: 54a4bd9d81a55bd6dc25a71c482131a3ddc2a24dc340f99489c9db31b71d9ea1 1.000000000000 308528 of 874629 -
04: 02b19951b76844e37eaa1c2c30bfe82746663e37a224b18a4bfe5a4fda24c5f4 7.000000000000 58145 of 285521 -
05: 3af1c5be1f2bc8585a419f4267dc4fe6a5b37e8de926f8aea2514b65be235ed1 10.000000000000 311366 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



3 inputs(s) for total of 19.100000000000 xmr

key image 00: 169db53c292b82847807b0ad5004466e20d6f02712bec88dff57a698b23b0d1b amount: 0.100000000000
ring members blk
- 00: df915d4d4c3c6ba952e7db3a0c895a8db664c3417c80fbaa9b1c12fcde1c1399 00267373
key image 01: ee2fb544066b2f6b8c259e6c6311597f62964dbed52ed41b1b171c6d19dfb269 amount: 10.000000000000
ring members blk
- 00: 0fce887e0d960aa80b91e216e14db8378c21b5d45d0f64883bcf453975c869f2 00266570
key image 02: b903c29dae42a20235ccb6fd17c66c7667128b235eda429060b4ede9177ff3b9 amount: 9.000000000000
ring members blk
- 00: 84784618f0199d192f119a41678cd531c2a8ed7ada49c2ad3445ed6e43643cde 00266991
More details
source code | moneroexplorer