Monero Transaction 3d4db895a8e5f0237b6ae3086d842c38a0a85268681cfa2f9234ab40fe021261

Autorefresh is OFF

Tx hash: 3d4db895a8e5f0237b6ae3086d842c38a0a85268681cfa2f9234ab40fe021261

Tx prefix hash: 74b1506a4ba5b32d357372732769ee9a539dbc2a72bee4b90d25d7da30fb6609
Tx public key: ae3f9f4495013332ab4eb1e031d195a0b91ea9954c69deff0bf3603ec83127ca
Payment id: cae1e3c6ff75b75670f2f286335a0bb8ff273a2f073e0facf9126d07ab978902

Transaction 3d4db895a8e5f0237b6ae3086d842c38a0a85268681cfa2f9234ab40fe021261 was carried out on the Monero network on 2014-08-03 15:45:13. The transaction has 3121024 confirmations. Total output fee is 0.005733560000 XMR.

Timestamp: 1407080713 Timestamp [UTC]: 2014-08-03 15:45:13 Age [y:d:h:m:s]: 10:102:00:49:18
Block: 157428 Fee (per_kB): 0.005733560000 (0.009546610472) Tx size: 0.6006 kB
Tx version: 1 No of confirmations: 3121024 RingCT/type: no
Extra: 022100cae1e3c6ff75b75670f2f286335a0bb8ff273a2f073e0facf9126d07ab97890201ae3f9f4495013332ab4eb1e031d195a0b91ea9954c69deff0bf3603ec83127ca

5 output(s) for total of 5.494266440000 xmr

stealth address amount amount idx tag
00: 39a6df10940a0ff273f6e036d41a5fc8e45b81c21d384f959c8e59ba3b673157 0.004266440000 0 of 1 -
01: ff93d1adfa291525d8ccc88c34fc9914b702ad949320896dd1f271dbd6520c89 0.090000000000 96986 of 317822 -
02: 4ff9d1b37b20c3f94f4b884f5790061ee779c8ea13f80456ea7a57950d30bce7 0.400000000000 131239 of 688584 -
03: b9c53809b4db51d09f4606720c5f997b6c0c4d6dd551d4f3a9464e4b2e6ab2c1 1.000000000000 162556 of 874629 -
04: b8065769003534b2e7fc36434e3bdbd809203dfe8ee8e4e2c0ce47c78ba19cf3 4.000000000000 31866 of 237197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-04-21 17:55:26 till 2014-08-03 16:03:42; resolution: 0.61 days)

  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |_________________________________________________________________________________________________________________*_______________________________________________________*|

2 inputs(s) for total of 5.500000000000 xmr

key image 00: 2923b34b6298e3e2e92a12867a7eb9c79318e4c1735e06df3148af19a94287bd amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5f0b37a81a22e2401e0bf3367d6549781c5ab5b4b55dff5931140ed84fe770fc 00005039 0 0/8 2014-04-21 18:55:26 10:205:21:39:05
- 01: 74fe96639e82b3a16e8da1c14f7bff6a1924f9425c81ad6f9ef9b3b92b527aed 00157388 2 15/105 2014-08-03 15:03:42 10:102:01:30:49
key image 01: 34b7d0826e045890f2fc59bc8ff97e19e2be67999b411ce27f6ccb327f1687a0 amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 82c30da5a89821a36697238596b466f87520fbaca7dd5c96f63b793a15772abf 00107677 0 0/5 2014-06-30 04:28:09 10:136:12:06:22
- 01: 9d498a3fdf236c6e110e6e5a2f465c694b0907999f30971a845e7288e44751d2 00157046 0 0/5 2014-08-03 09:43:43 10:102:06:50:48
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 500000000000, "key_offsets": [ 5044, 188413 ], "k_image": "2923b34b6298e3e2e92a12867a7eb9c79318e4c1735e06df3148af19a94287bd" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 26567, 60178 ], "k_image": "34b7d0826e045890f2fc59bc8ff97e19e2be67999b411ce27f6ccb327f1687a0" } } ], "vout": [ { "amount": 4266440000, "target": { "key": "39a6df10940a0ff273f6e036d41a5fc8e45b81c21d384f959c8e59ba3b673157" } }, { "amount": 90000000000, "target": { "key": "ff93d1adfa291525d8ccc88c34fc9914b702ad949320896dd1f271dbd6520c89" } }, { "amount": 400000000000, "target": { "key": "4ff9d1b37b20c3f94f4b884f5790061ee779c8ea13f80456ea7a57950d30bce7" } }, { "amount": 1000000000000, "target": { "key": "b9c53809b4db51d09f4606720c5f997b6c0c4d6dd551d4f3a9464e4b2e6ab2c1" } }, { "amount": 4000000000000, "target": { "key": "b8065769003534b2e7fc36434e3bdbd809203dfe8ee8e4e2c0ce47c78ba19cf3" } } ], "extra": [ 2, 33, 0, 202, 225, 227, 198, 255, 117, 183, 86, 112, 242, 242, 134, 51, 90, 11, 184, 255, 39, 58, 47, 7, 62, 15, 172, 249, 18, 109, 7, 171, 151, 137, 2, 1, 174, 63, 159, 68, 149, 1, 51, 50, 171, 78, 177, 224, 49, 209, 149, 160, 185, 30, 169, 149, 76, 105, 222, 255, 11, 243, 96, 62, 200, 49, 39, 202 ], "signatures": [ "e46c40dcdc99343688bfddaed7b02d45080c928e0b5b0b4ccc34a84905d75c02b8996e8e162d455e023f972c570dc09c502d9ea50f19618789af117019934407230bd53a6d30ac64f752ac1d4fb2fd8264a377f7c69d53a8f801635f677bf700020e18b897cb261c4fd03ab21f3abb260caf7b6559d4bb78f1955c06af04390c", "403831c04ff292b5b73cc027f5fafb7f61d0a07fe1be75887a8922d0e53512070cdcbf4453bb984a439fba4954c6d2ec1b265be8d3157cef9d034df1158b7a0a3f077093b3facc8c338bbfe888db1b131886bc9e9eb498149b5412677b029105f22ca8981f74430afa4957f6e9c0837b163ff01c9d1d38a0196b5b2869dd470b"] }


Less details
source code | moneroexplorer