Monero Transaction 34240b06a3865e77f6d3c7592cb218f9eea781a182bdde1f727080dab6bd5998

Autorefresh is OFF

Tx hash: 34240b06a3865e77f6d3c7592cb218f9eea781a182bdde1f727080dab6bd5998

Tx prefix hash: 211d59842ce07a0c666eac6207efa75e9b4bac6d584bf879d9bf8e5bd4fa2dcc
Tx public key: f490e037eb6f4998951e29d36801bfb440c753f335e9bd3caacf615ed629475d
Payment id: 5f049b130903d41f631d9bd6d8a5677b1ef4dfd05690d4e8d0573ac96db14073

Transaction 34240b06a3865e77f6d3c7592cb218f9eea781a182bdde1f727080dab6bd5998 was carried out on the Monero network on 2014-10-21 02:36:28. The transaction has 3035767 confirmations. Total output fee is 0.116057609663 XMR.

Timestamp: 1413858988 Timestamp [UTC]: 2014-10-21 02:36:28 Age [y:d:h:m:s]: 10:061:05:27:57
Block: 269734 Fee (per_kB): 0.116057609663 (0.245543372510) Tx size: 0.4727 kB
Tx version: 1 No of confirmations: 3035767 RingCT/type: no
Extra: 0221005f049b130903d41f631d9bd6d8a5677b1ef4dfd05690d4e8d0573ac96db1407301f490e037eb6f4998951e29d36801bfb440c753f335e9bd3caacf615ed629475d

5 output(s) for total of 50.783942390337 xmr

stealth address amount amount idx tag
00: 064cb1e09155360c634ed652783d7ba473e30ec4eea2be1f9f62db1d51a452f6 0.083942390337 0 of 1 -
01: 17e32fe0e45f7b99676c517de877d57ba0299ea5c331c0e33b8cbb22ec453125 0.800000000000 185765 of 489955 -
02: 64bec82e2b49142d5ba0398a1a956c4fcd2c12883db7b64b47eeee59a7b6c8a4 0.900000000000 148376 of 454894 -
03: 00d61e92653d9ef5886a1fe908e7f8bd18221a0271d558b8a44156aacf1190c1 9.000000000000 23973 of 274259 -
04: 4174b3991663bbc8e86bbf81eafb8313c156eb3c701ec14fd6b74f7ab2a3329e 40.000000000000 6807 of 41682 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-10-20 14:38:57 till 2014-10-21 02:42:55; resolution: 0.00 days)

  • |___________________________________________________________________________________________________________________________________________________________*______________|
  • |_______________*__________________________________________________________________________________________________________________________________________________________|

2 inputs(s) for total of 50.900000000000 xmr

key image 00: b617244ab1058190e4aac5d4615213a8d3308993326880f7166cf67c1d5d7be8 amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 2865656b502abe0705dcf052947ddd4a2a15cf7b6a73d145ab4b8c8a1fb7941a 00269688 1 2/4 2014-10-21 01:42:55 10:061:06:21:30
key image 01: a77e491ce05b599242f52cee0feba7653848cbcf6919a66a039a89f156a42cfb amount: 50.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c8110b2b60038f829031442d63fcaf37069ccf0b1932785cb992d2c945f2af4e 00269183 1 18/4 2014-10-20 15:38:57 10:061:16:25:28
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 900000000000, "key_offsets": [ 148354 ], "k_image": "b617244ab1058190e4aac5d4615213a8d3308993326880f7166cf67c1d5d7be8" } }, { "key": { "amount": 50000000000000, "key_offsets": [ 7576 ], "k_image": "a77e491ce05b599242f52cee0feba7653848cbcf6919a66a039a89f156a42cfb" } } ], "vout": [ { "amount": 83942390337, "target": { "key": "064cb1e09155360c634ed652783d7ba473e30ec4eea2be1f9f62db1d51a452f6" } }, { "amount": 800000000000, "target": { "key": "17e32fe0e45f7b99676c517de877d57ba0299ea5c331c0e33b8cbb22ec453125" } }, { "amount": 900000000000, "target": { "key": "64bec82e2b49142d5ba0398a1a956c4fcd2c12883db7b64b47eeee59a7b6c8a4" } }, { "amount": 9000000000000, "target": { "key": "00d61e92653d9ef5886a1fe908e7f8bd18221a0271d558b8a44156aacf1190c1" } }, { "amount": 40000000000000, "target": { "key": "4174b3991663bbc8e86bbf81eafb8313c156eb3c701ec14fd6b74f7ab2a3329e" } } ], "extra": [ 2, 33, 0, 95, 4, 155, 19, 9, 3, 212, 31, 99, 29, 155, 214, 216, 165, 103, 123, 30, 244, 223, 208, 86, 144, 212, 232, 208, 87, 58, 201, 109, 177, 64, 115, 1, 244, 144, 224, 55, 235, 111, 73, 152, 149, 30, 41, 211, 104, 1, 191, 180, 64, 199, 83, 243, 53, 233, 189, 60, 170, 207, 97, 94, 214, 41, 71, 93 ], "signatures": [ "dd159d819f392a470726b874a85c1f331570c230958fa45777ff2312ac707f03b54aaed0aab6291af7af805201b421715f1d32f4e72709270e5cdd61b528ce06", "26ff79e0c93acd47b15f2f02babcdc4ad4a7cc8d7c1edc9018f57f83fb77b00cf2150a9eab557f40997e64a8778e5128f8f679874ea915e6fcf757ea90202808"] }


Less details
source code | moneroexplorer