Monero Transaction 34ddea63d5c5f17cddbafad9ee28ed6d90567308194ceed9eb40d89f965fe1d8

Autorefresh is OFF

Tx hash: 34ddea63d5c5f17cddbafad9ee28ed6d90567308194ceed9eb40d89f965fe1d8

Tx prefix hash: 901b5d618eb895b8aabd0fc2414f0c4bee5c5f8b1f6db453f3bfd653e2d9344b
Tx public key: bb2e3e146314cc3257fc6c79076d07eaef0e6c046f2fea7f6539e238119a4e1a
Payment id: 10168f91ebbdc927479b620d703b372bd4b31b4c214631cc754ea7eed708b648

Transaction 34ddea63d5c5f17cddbafad9ee28ed6d90567308194ceed9eb40d89f965fe1d8 was carried out on the Monero network on 2014-06-29 12:58:05. The transaction has 3135273 confirmations. Total output fee is 0.010490000000 XMR.

Timestamp: 1404046685 Timestamp [UTC]: 2014-06-29 12:58:05 Age [y:d:h:m:s]: 10:086:13:49:50
Block: 106781 Fee (per_kB): 0.010490000000 (0.022425386221) Tx size: 0.4678 kB
Tx version: 1 No of confirmations: 3135273 RingCT/type: no
Extra: 02210010168f91ebbdc927479b620d703b372bd4b31b4c214631cc754ea7eed708b64801bb2e3e146314cc3257fc6c79076d07eaef0e6c046f2fea7f6539e238119a4e1a

5 output(s) for total of 1.989600000000 xmr

stealth address amount amount idx tag
00: 793efeb1c446bed8d1581bed5cf7451b540030cf33c755af6bc9f4a3bf3f6dc6 0.009600000000 0 of 24 -
01: 825857157331b10baeb07063ac6b61cbc329fd9995d3b63c71d6fa8e8b60a166 0.080000000000 72490 of 269575 -
02: 0c0760c7e41a559320090ffc826ae16daff694752a6125d11c9a38731b068a5c 0.100000000000 205094 of 982315 -
03: ead246dd65fcd30a9f9c49b96589984fb38df17f7b1ba3ecab7c78db540e8358 0.800000000000 34385 of 489955 -
04: 475ab35dc1a3947d798aeecd096f27b384dee806b60264317167a4a5423723e8 1.000000000000 56876 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-13 17:05:08 till 2014-06-25 02:43:26; resolution: 0.07 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 2.000090000000 xmr

key image 00: c9ff9ded9ce6d81df05522567cdd5e803440dc1c6b5eccb666f4d4ea4819aef3 amount: 0.000090000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 14e37e7019a3c137585de1be6e7633e67cf00181e684487dd2bd228a1215398c 00083791 1 2/5 2014-06-13 18:05:08 10:102:08:42:47
key image 01: f3a431ae52bfe3ec97eefecc8929c91ee1eeb223a96f64d88aaafb14fdbbdbd0 amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: fe849cce6e8d2ba2ffb1ae53bf772174367fc704c77c81bf39b0e75f78e37adc 00100296 1 6/2 2014-06-25 01:43:26 10:091:01:04:29
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 90000000, "key_offsets": [ 35265 ], "k_image": "c9ff9ded9ce6d81df05522567cdd5e803440dc1c6b5eccb666f4d4ea4819aef3" } }, { "key": { "amount": 2000000000000, "key_offsets": [ 21069 ], "k_image": "f3a431ae52bfe3ec97eefecc8929c91ee1eeb223a96f64d88aaafb14fdbbdbd0" } } ], "vout": [ { "amount": 9600000000, "target": { "key": "793efeb1c446bed8d1581bed5cf7451b540030cf33c755af6bc9f4a3bf3f6dc6" } }, { "amount": 80000000000, "target": { "key": "825857157331b10baeb07063ac6b61cbc329fd9995d3b63c71d6fa8e8b60a166" } }, { "amount": 100000000000, "target": { "key": "0c0760c7e41a559320090ffc826ae16daff694752a6125d11c9a38731b068a5c" } }, { "amount": 800000000000, "target": { "key": "ead246dd65fcd30a9f9c49b96589984fb38df17f7b1ba3ecab7c78db540e8358" } }, { "amount": 1000000000000, "target": { "key": "475ab35dc1a3947d798aeecd096f27b384dee806b60264317167a4a5423723e8" } } ], "extra": [ 2, 33, 0, 16, 22, 143, 145, 235, 189, 201, 39, 71, 155, 98, 13, 112, 59, 55, 43, 212, 179, 27, 76, 33, 70, 49, 204, 117, 78, 167, 238, 215, 8, 182, 72, 1, 187, 46, 62, 20, 99, 20, 204, 50, 87, 252, 108, 121, 7, 109, 7, 234, 239, 14, 108, 4, 111, 47, 234, 127, 101, 57, 226, 56, 17, 154, 78, 26 ], "signatures": [ "f3b80a43bef69bd620035a7b9881d2d288135300033c1e8384d9cad611f8d505019c3de9ae911ac23b11a5f8410012da051a03bc280dd4f3e276421c3b966400", "701eb4ed63c671352affd23a47372f9df7f9919cccc6e460c979fe99af630c0740d5e9595d8811a344e7cc3b652a186d859e777d7b10b9de9c02e6bc23584806"] }


Less details
source code | moneroexplorer