Monero Transaction 34d211a3ce311ff941d9da6abafd6f13983a77b713184175098ef92667c581fa

Autorefresh is OFF

Tx hash: 34d211a3ce311ff941d9da6abafd6f13983a77b713184175098ef92667c581fa

Tx prefix hash: bb818c5aa2e6741068c6bcd5665501919542176ee7e8818a9e72f3dc071790c5
Tx public key: 79f91b999df39a6bdced4428fd623c13f654fa58b3aac47ee7c65bae9a900811
Payment id: 665be1628d426efeb125f6ae7975e74da31e1543d71a5844b42411f8b30d68ca

Transaction 34d211a3ce311ff941d9da6abafd6f13983a77b713184175098ef92667c581fa was carried out on the Monero network on 2014-11-14 13:38:36. The transaction has 2996543 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1415972316 Timestamp [UTC]: 2014-11-14 13:38:36 Age [y:d:h:m:s]: 10:030:20:39:21
Block: 304705 Fee (per_kB): 0.010000000000 (0.017268128162) Tx size: 0.5791 kB
Tx version: 1 No of confirmations: 2996543 RingCT/type: no
Extra: 022100665be1628d426efeb125f6ae7975e74da31e1543d71a5844b42411f8b30d68ca0179f91b999df39a6bdced4428fd623c13f654fa58b3aac47ee7c65bae9a900811

5 output(s) for total of 14.080000000000 xmr

stealth address amount amount idx tag
00: f8c8739a6558aef965654caecda7cd28f5b6643c6e71592b88c9a219ac8df0b0 0.080000000000 104182 of 269576 -
01: a960e85bb32cc719124daa9f26919ace5427f7762f959677e402053ffc70bb69 0.100000000000 628383 of 982315 -
02: 8c5e39afb10de34237a041e5f6b17db66c1ad73b7db8bc0aff1dc2090e0807ce 0.900000000000 159101 of 454894 -
03: f68fdbc2128bca432a48975a0c737ab7a8e4a58265188b24cebc0dbbbcfc65de 5.000000000000 123566 of 255089 -
04: 315101364424fbd0c1cf7b31376410e8acab24cc23a4de0205bf29a0c19a8a46 8.000000000000 23950 of 226902 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-11-14 07:21:38 till 2014-11-14 13:57:43; resolution: 0.00 days)

  • |________________________________________________________________________________________________________________________________________________*_________________________|
  • |__________________________*_______________________________________________________________________________________________________________________________________________|
  • |__________________________*_______________________________________________________________________________________________________________________________________________|

3 inputs(s) for total of 14.090000000000 xmr

key image 00: 8c006aa7af27ad86bdbeaa7d95fd7871a9555b56eb1afa677203b3f6bd380da6 amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e736a2387bafd3e77320354b1de9f32db99c99d800ec1ac8c7d32e4a182f4792 00304653 1 4/5 2014-11-14 12:57:43 10:030:21:20:14
key image 01: c2ddf73ca5472b54c91925eb9116e5eeb2f9fa1ac6999a8a8336b009f96b34cd amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5a677400f572a8de1c01d08221e359159c60290ccf5ff7ba65c400cbe59babe7 00304352 1 1/6 2014-11-14 08:21:38 10:031:01:56:19
key image 02: 787e33fbbaec64417adc781f84837a5e363701e3a0d54a5d6200b90885cfd2c5 amount: 9.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: afde5f64b6d46465cc81b31cdd8b293e265f45ffbeeffa5077bf57e8b0daf645 00304352 1 5/52 2014-11-14 08:21:38 10:031:01:56:19
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000000, "key_offsets": [ 123549 ], "k_image": "8c006aa7af27ad86bdbeaa7d95fd7871a9555b56eb1afa677203b3f6bd380da6" } }, { "key": { "amount": 90000000000, "key_offsets": [ 122393 ], "k_image": "c2ddf73ca5472b54c91925eb9116e5eeb2f9fa1ac6999a8a8336b009f96b34cd" } }, { "key": { "amount": 9000000000000, "key_offsets": [ 26085 ], "k_image": "787e33fbbaec64417adc781f84837a5e363701e3a0d54a5d6200b90885cfd2c5" } } ], "vout": [ { "amount": 80000000000, "target": { "key": "f8c8739a6558aef965654caecda7cd28f5b6643c6e71592b88c9a219ac8df0b0" } }, { "amount": 100000000000, "target": { "key": "a960e85bb32cc719124daa9f26919ace5427f7762f959677e402053ffc70bb69" } }, { "amount": 900000000000, "target": { "key": "8c5e39afb10de34237a041e5f6b17db66c1ad73b7db8bc0aff1dc2090e0807ce" } }, { "amount": 5000000000000, "target": { "key": "f68fdbc2128bca432a48975a0c737ab7a8e4a58265188b24cebc0dbbbcfc65de" } }, { "amount": 8000000000000, "target": { "key": "315101364424fbd0c1cf7b31376410e8acab24cc23a4de0205bf29a0c19a8a46" } } ], "extra": [ 2, 33, 0, 102, 91, 225, 98, 141, 66, 110, 254, 177, 37, 246, 174, 121, 117, 231, 77, 163, 30, 21, 67, 215, 26, 88, 68, 180, 36, 17, 248, 179, 13, 104, 202, 1, 121, 249, 27, 153, 157, 243, 154, 107, 220, 237, 68, 40, 253, 98, 60, 19, 246, 84, 250, 88, 179, 170, 196, 126, 231, 198, 91, 174, 154, 144, 8, 17 ], "signatures": [ "8e87a7f0dd7429879f580ed8a5f485229117132d32214dd9d1197c1c77488005fd9ba4e9b6ca1a3e46627265e655953f60f5e4f2012ae1d264934f9ef228c20b", "c2fb08fbfc04e20869cd5ba776a272366b323109df22e29ae1489ee698ffc20efd2bdac471eb069ed05ad19d140ea35d9659b262bdb5a5c9b2c4d04a2b50bd0c", "ec8c6676362e4a109643afa28e5f0656742e67d1a4e1ae7e81961706ce2dd30ad2002789ad15dc2aab351a2990d6429e653d85fd8723c21b1cf41e5a2f66bf0b"] }


Less details
source code | moneroexplorer