Monero Transaction 3fda4aba3aba22ecb40a482c2ad1dbdaadb36cb82cbfba410f1c6a971964d51c

Autorefresh is OFF

Tx hash: 3fda4aba3aba22ecb40a482c2ad1dbdaadb36cb82cbfba410f1c6a971964d51c

Tx prefix hash: a546c77ca9cfe02eddc393243fe9b634de036ef4af823041699426113c6ec08f
Tx public key: dc9a9547e025ab6f910e6cf2963a7524a4cd1ee980f4d10b6a79057280bbd36d
Payment id: 65fbe3622c4fd8db55ba6e3c1a4c36c955944ba90c7c8d7aac3e102847b1aabe

Transaction 3fda4aba3aba22ecb40a482c2ad1dbdaadb36cb82cbfba410f1c6a971964d51c was carried out on the Monero network on 2014-07-28 16:48:40. The transaction has 3129364 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1406566120 Timestamp [UTC]: 2014-07-28 16:48:40 Age [y:d:h:m:s]: 10:107:15:27:49
Block: 148828 Fee (per_kB): 0.005000000000 (0.010644490644) Tx size: 0.4697 kB
Tx version: 1 No of confirmations: 3129364 RingCT/type: no
Extra: 02210065fbe3622c4fd8db55ba6e3c1a4c36c955944ba90c7c8d7aac3e102847b1aabe01dc9a9547e025ab6f910e6cf2963a7524a4cd1ee980f4d10b6a79057280bbd36d

5 output(s) for total of 2.595000000000 xmr

stealth address amount amount idx tag
00: 8445a323b9e6514dbf78a131b59933814bffefaf782ad6578a0ced86e5f3d611 0.005000000000 197025 of 308584 -
01: b30d658f44b4b596ecede8cfc8e0085826952407e20a34236e43cf70674437f8 0.090000000000 91585 of 317822 -
02: 780a131cb91fd47d5ce971b717c7ca9262c086c826fc89ed8a8d459b9ccd19fc 0.600000000000 114671 of 650760 -
03: 59739c3ae389e05d582a0a0af29811ab96fbb25c056685cabcb6ae76f8e41a4e 0.900000000000 68446 of 454894 -
04: d4f57d1c2138468b6daced0336bf7e99f28fd536a3251beb508e8a2f2e0b1c63 1.000000000000 143684 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-26 07:24:48 till 2014-07-26 20:28:46; resolution: 0.00 days)

  • |_____________*____________________________________________________________________________________________________________________________________________________________|
  • |_____________________________________________________________________________________________________________________________________________________________*____________|

2 inputs(s) for total of 2.600000000000 xmr

key image 00: 05a11f3c81564144a9ac58c001593c40622d3b89074870b4b76b76d3a38df272 amount: 0.600000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9400158b5f011ae0ada08100ef8096620ae3bfb0bd3a3fb28bba40cdeae83c0b 00145422 1 12/46 2014-07-26 08:24:48 10:109:23:51:41
key image 01: 5024cab10f09b7e421420ff674140e2386f90b3d1f6a0eaa0e62498c467861a5 amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ba110c99bec7426993b1f292ad28cd3e043ff406db5235cb0ff26e5644d512ad 00146127 1 74/85 2014-07-26 19:28:46 10:109:12:47:43
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 600000000000, "key_offsets": [ 109757 ], "k_image": "05a11f3c81564144a9ac58c001593c40622d3b89074870b4b76b76d3a38df272" } }, { "key": { "amount": 2000000000000, "key_offsets": [ 54697 ], "k_image": "5024cab10f09b7e421420ff674140e2386f90b3d1f6a0eaa0e62498c467861a5" } } ], "vout": [ { "amount": 5000000000, "target": { "key": "8445a323b9e6514dbf78a131b59933814bffefaf782ad6578a0ced86e5f3d611" } }, { "amount": 90000000000, "target": { "key": "b30d658f44b4b596ecede8cfc8e0085826952407e20a34236e43cf70674437f8" } }, { "amount": 600000000000, "target": { "key": "780a131cb91fd47d5ce971b717c7ca9262c086c826fc89ed8a8d459b9ccd19fc" } }, { "amount": 900000000000, "target": { "key": "59739c3ae389e05d582a0a0af29811ab96fbb25c056685cabcb6ae76f8e41a4e" } }, { "amount": 1000000000000, "target": { "key": "d4f57d1c2138468b6daced0336bf7e99f28fd536a3251beb508e8a2f2e0b1c63" } } ], "extra": [ 2, 33, 0, 101, 251, 227, 98, 44, 79, 216, 219, 85, 186, 110, 60, 26, 76, 54, 201, 85, 148, 75, 169, 12, 124, 141, 122, 172, 62, 16, 40, 71, 177, 170, 190, 1, 220, 154, 149, 71, 224, 37, 171, 111, 145, 14, 108, 242, 150, 58, 117, 36, 164, 205, 30, 233, 128, 244, 209, 11, 106, 121, 5, 114, 128, 187, 211, 109 ], "signatures": [ "60318c80ba66d6698a074498371a7e63792b1242730eaa9bb51062b6a277be045e37937dc24b505775fe1a94c78f2a0d293d2e2a80085ae5c7486ab4bd5ddb0a", "23917523a872cea4660717d9b7cf0b768f4775ba2b922fdae44e299d93e9fe02cb1b250aac8d57b7afe158bbe0b10bd5d5c6df85304e370c14c61b5a7b54f201"] }


Less details
source code | moneroexplorer