Monero Transaction 3df29695f45df1c1b11c250b9bada4130d68a8cf210d36cfd871fcd4c297424a

Autorefresh is OFF

Tx hash: 3df29695f45df1c1b11c250b9bada4130d68a8cf210d36cfd871fcd4c297424a

Tx prefix hash: c8c8bcb5b3f709043bf11fa585135247c412e28241794289659ad1d1c686ca71
Tx public key: a4d548c01e2bc718b3fa9dc6426595b6b4cad049b8e850f6c96b63070110f272

Transaction 3df29695f45df1c1b11c250b9bada4130d68a8cf210d36cfd871fcd4c297424a was carried out on the Monero network on 2014-06-18 16:12:43. The transaction has 3199674 confirmations. Total output fee is 0.005190000000 XMR.

Timestamp: 1403107963 Timestamp [UTC]: 2014-06-18 16:12:43 Age [y:d:h:m:s]: 10:164:22:59:37
Block: 90963 Fee (per_kB): 0.005190000000 (0.014520655738) Tx size: 0.3574 kB
Tx version: 1 No of confirmations: 3199674 RingCT/type: no
Extra: 01a4d548c01e2bc718b3fa9dc6426595b6b4cad049b8e850f6c96b63070110f272

3 output(s) for total of 0.080810000000 xmr

stealth address amount amount idx tag
00: 9dba19ead4d6cbfc97edaeea86f222f1158f3512f8aa27a01750e940cd2140d1 0.001810000000 351 of 373 -
01: ab95e476d2b58db8bcec12f940ec94281b2523f16a433f66798126e4c35a6199 0.009000000000 125300 of 233398 -
02: e0e9ac3a3cce835be994616d4b2733bc7e15df423e5b5c1bcebc83a55a645028 0.070000000000 65136 of 263947 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-18 14:11:42 till 2014-06-18 16:41:58; resolution: 0.00 days)

  • |______________________________________________________________________________________________________*___________________________________________________________________|
  • |____________________________________________________________________*_____________________________________________________________________________________________________|

2 inputs(s) for total of 0.086000000000 xmr

key image 00: ae2c8c2e89274350fd0443f7c024ec79610beefffbbab8e5e24ec8997be25e27 amount: 0.006000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 08288cae96d2e56317143d26ee2899787b8d71c1f8e234b174f162393756b993 00090930 1 3/33 2014-06-18 15:41:58 10:164:23:30:22
key image 01: 9489981e85e86b66c06de514cee60a3f0c734850cb20e3cf0b127ed0bedd984c amount: 0.080000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: befc59f504c113a64e2b643313105d1686d50c90ea3b2437acce03aa6b111dd4 00090892 1 18/42 2014-06-18 15:11:42 10:165:00:00:38
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 6000000000, "key_offsets": [ 144178 ], "k_image": "ae2c8c2e89274350fd0443f7c024ec79610beefffbbab8e5e24ec8997be25e27" } }, { "key": { "amount": 80000000000, "key_offsets": [ 59861 ], "k_image": "9489981e85e86b66c06de514cee60a3f0c734850cb20e3cf0b127ed0bedd984c" } } ], "vout": [ { "amount": 1810000000, "target": { "key": "9dba19ead4d6cbfc97edaeea86f222f1158f3512f8aa27a01750e940cd2140d1" } }, { "amount": 9000000000, "target": { "key": "ab95e476d2b58db8bcec12f940ec94281b2523f16a433f66798126e4c35a6199" } }, { "amount": 70000000000, "target": { "key": "e0e9ac3a3cce835be994616d4b2733bc7e15df423e5b5c1bcebc83a55a645028" } } ], "extra": [ 1, 164, 213, 72, 192, 30, 43, 199, 24, 179, 250, 157, 198, 66, 101, 149, 182, 180, 202, 208, 73, 184, 232, 80, 246, 201, 107, 99, 7, 1, 16, 242, 114 ], "signatures": [ "bb3211e5480f17c650924aab64e6780149ae740fbdfdfd6668910447f836d302e7d77773bcb21c2da45f8063db58c87473c54b15d58757963536cda9a0601406", "2649d00b6597cb77aee9940e8c2e38aad086f26be8cd4d10e14f70e709913a0f61223d762e353b98e04039cec87d35a4562ab8f5404d32c2bfca4ec78f52ea06"] }


Less details
source code | moneroexplorer