Monero Transaction 3d80fd0239c57ab524f1efdf35327f60ad248172bc0bd919f50d035514425a5e

Autorefresh is OFF

Tx hash: 3d80fd0239c57ab524f1efdf35327f60ad248172bc0bd919f50d035514425a5e

Tx prefix hash: 23ac3452ceba40be0f01c8706dd969ec8c70b34bd1c66417fc76120098812496
Tx public key: 51fb6024c4cc464436b06eaa4915b1a512eea3e8264822f272db359e93a5e3d8
Payment id: df947bec8bd4203d2a7842f5ad7501696b16af15a714d2cd0368f4f198b7af33

Transaction 3d80fd0239c57ab524f1efdf35327f60ad248172bc0bd919f50d035514425a5e was carried out on the Monero network on 2014-07-02 11:29:17. The transaction has 3167471 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1404300557 Timestamp [UTC]: 2014-07-02 11:29:17 Age [y:d:h:m:s]: 10:134:05:59:25
Block: 111020 Fee (per_kB): 0.010000000000 (0.011118349620) Tx size: 0.8994 kB
Tx version: 1 No of confirmations: 3167471 RingCT/type: no
Extra: 022100df947bec8bd4203d2a7842f5ad7501696b16af15a714d2cd0368f4f198b7af330151fb6024c4cc464436b06eaa4915b1a512eea3e8264822f272db359e93a5e3d8

8 output(s) for total of 84.100000000000 xmr

stealth address amount amount idx tag
00: d3973940e01bdb720b84b21878d729d94ddf7a4538983f3f9a85e62060eae9e7 0.020000000000 195397 of 381491 -
01: 8c8cb64750fafd4cbd3807de3419b53b381b5dfbe45eef61d7c16430cab5fa37 0.080000000000 73690 of 269576 -
02: a8bfd64570f7fb69d02bb36cd13214b7146a9921fd7401d1af7833b7a3c49bca 0.100000000000 220252 of 982315 -
03: 4f053e117b5e3d68a56a6cd14b842166de7dea17d07b4cb2ee5cdb85bad8081b 0.900000000000 41767 of 454894 -
04: 24a7a5f31101b66673d72b1b6539cddaae3f9160a9efa8a50e6dd915cc62a6fc 4.000000000000 17453 of 237197 -
05: 69c364266e568eeb57b6f8e2f47136fd8f23c8d245ee8b3e65699a99bdd43d88 9.000000000000 8872 of 274259 -
06: 98519203acab267590c3174473b0075f7d5542a0881aab02eea6b7e03b865f7d 20.000000000000 4341 of 78991 -
07: eaf7249c19729e071a80c34a25684c671130029d6a5cbbf1c52ca3562a7cd492 50.000000000000 2151 of 44703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-23 17:08:17 till 2014-06-30 21:26:51; resolution: 0.04 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |________________________________________________*_________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |__________________________________________________________________________________*_______________________________________________________________________________________|
  • |__________________________________________________________________________________________________________________________________________________*_______________________|

5 inputs(s) for total of 84.110000000000 xmr

key image 00: e75f8f2c3d174de7badfe2067f06a5ac323c6d8f0c101eae9cfd62d784060789 amount: 0.010000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d067249c9e9df6b2eaf2f66655db2afe647c630ceee42aa0357b856d361110be 00098458 1 75/11 2014-06-23 18:08:17 10:142:23:20:25
key image 01: 53c10bd9ea3c27d2c612fa77dc28c84f87157eed01abe16d5ad5718e0bbecb68 amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d5fe24ca7c1a4ae5e8d5cccafd5f85ef465c77602fb92621b23148096c0655dd 00101225 1 57/1 2014-06-25 17:12:06 10:141:00:16:36
key image 02: 6b80d9e8dae04d714a9b59129cba1f1900a5215cb4869a668e14a380f43e198b amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7cb4b772cd59f4fa5e8143f79fd497ebc54084ef5d443da1f95f9795c4bcd53f 00108643 1 2/7 2014-06-30 20:26:51 10:135:21:01:51
key image 03: 924d67e7055f6cee8b855b2bb2c0592963d2f0fd9a2c22635500b8a2ccf14ade amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ec90466e9c3c3f00847027d06b9cb8b38e50de772e0c20eebe3160c59decff41 00103341 1 4/5 2014-06-27 04:42:26 10:139:12:46:16
key image 04: 3b6c01511f2c324092239a86bc27f87d12afc4e89db0f911cd4bb30d081f20dc amount: 80.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: cfd74bc5ac11befae64b229a611498b06293213893486aa07cc408be0ed6d790 00107307 1 5/10 2014-06-29 21:52:17 10:136:19:36:25
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 10000000000, "key_offsets": [ 303029 ], "k_image": "e75f8f2c3d174de7badfe2067f06a5ac323c6d8f0c101eae9cfd62d784060789" } }, { "key": { "amount": 100000000000, "key_offsets": [ 174242 ], "k_image": "53c10bd9ea3c27d2c612fa77dc28c84f87157eed01abe16d5ad5718e0bbecb68" } }, { "key": { "amount": 1000000000000, "key_offsets": [ 60667 ], "k_image": "6b80d9e8dae04d714a9b59129cba1f1900a5215cb4869a668e14a380f43e198b" } }, { "key": { "amount": 3000000000000, "key_offsets": [ 16748 ], "k_image": "924d67e7055f6cee8b855b2bb2c0592963d2f0fd9a2c22635500b8a2ccf14ade" } }, { "key": { "amount": 80000000000000, "key_offsets": [ 747 ], "k_image": "3b6c01511f2c324092239a86bc27f87d12afc4e89db0f911cd4bb30d081f20dc" } } ], "vout": [ { "amount": 20000000000, "target": { "key": "d3973940e01bdb720b84b21878d729d94ddf7a4538983f3f9a85e62060eae9e7" } }, { "amount": 80000000000, "target": { "key": "8c8cb64750fafd4cbd3807de3419b53b381b5dfbe45eef61d7c16430cab5fa37" } }, { "amount": 100000000000, "target": { "key": "a8bfd64570f7fb69d02bb36cd13214b7146a9921fd7401d1af7833b7a3c49bca" } }, { "amount": 900000000000, "target": { "key": "4f053e117b5e3d68a56a6cd14b842166de7dea17d07b4cb2ee5cdb85bad8081b" } }, { "amount": 4000000000000, "target": { "key": "24a7a5f31101b66673d72b1b6539cddaae3f9160a9efa8a50e6dd915cc62a6fc" } }, { "amount": 9000000000000, "target": { "key": "69c364266e568eeb57b6f8e2f47136fd8f23c8d245ee8b3e65699a99bdd43d88" } }, { "amount": 20000000000000, "target": { "key": "98519203acab267590c3174473b0075f7d5542a0881aab02eea6b7e03b865f7d" } }, { "amount": 50000000000000, "target": { "key": "eaf7249c19729e071a80c34a25684c671130029d6a5cbbf1c52ca3562a7cd492" } } ], "extra": [ 2, 33, 0, 223, 148, 123, 236, 139, 212, 32, 61, 42, 120, 66, 245, 173, 117, 1, 105, 107, 22, 175, 21, 167, 20, 210, 205, 3, 104, 244, 241, 152, 183, 175, 51, 1, 81, 251, 96, 36, 196, 204, 70, 68, 54, 176, 110, 170, 73, 21, 177, 165, 18, 238, 163, 232, 38, 72, 34, 242, 114, 219, 53, 158, 147, 165, 227, 216 ], "signatures": [ "6b68a7d825c6a9f6a889610b205bbae6a83dd736d0643ebd980e5ebf57c26a07379a6342210cfbd2bde93eef4245a053dfe96e89a9025eb4664a40e4ff7bc206", "e9c7e9ad5dfa72988ed0833140f4555a2b410d57fe26c513646ddb606d6af9027839efc499edcc879950a63bff9eae4dbbd620ef25209f02384b5ad413d82003", "4faa0d5581c52a1a4bbc3c8213c2f89a93565d0c123e6c9c9a76002d2f85f00f92a842d40c9fdd4f2f501c81bdb067d43bf5186d0fd1673e7f517754fa7fa50b", "c4fa90af95879e3c2fd7f08872e74a83035a72a7ebd4dd3f794a1e333f9f5601878a44eb4f9bf6c0cb58ea2f9580410e7c16a8adf6b782c9c6d80c5dffadb505", "77d6e7dd4d3d4e6feab4ac3253be50599348afa8f2d2196c2afe56c80cab3408919eb306a112b9f9199043b317e75202afced8fde5f115212d13ae8d4248e603"] }


Less details
source code | moneroexplorer