Monero Transaction 634e6edb90ebdf6afa758e6c54250ad321681a2dbf8ed012816da4848776ce7e

Autorefresh is OFF

Tx hash: 634e6edb90ebdf6afa758e6c54250ad321681a2dbf8ed012816da4848776ce7e

Tx prefix hash: 605e925e213f7948c1e55963c3b90691ed9cf537f05dbd32f2b8fe6fde04cb8d
Tx public key: 4afe40ce9ba22d5f5689ff5583282a2135276d2b7ccb54ef93137dba187c66d4
Payment id: 80956ab50b01403b8b39d60cf1e1e0a19ed1a8376a6d4c5385869f47ed2674fd

Transaction 634e6edb90ebdf6afa758e6c54250ad321681a2dbf8ed012816da4848776ce7e was carried out on the Monero network on 2015-06-29 07:31:12. The transaction has 2699504 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1435563072 Timestamp [UTC]: 2015-06-29 07:31:12 Age [y:d:h:m:s]: 09:206:13:46:01
Block: 628785 Fee (per_kB): 0.010000000000 (0.027978142077) Tx size: 0.3574 kB
Tx version: 1 No of confirmations: 2699504 RingCT/type: no
Extra: 02210080956ab50b01403b8b39d60cf1e1e0a19ed1a8376a6d4c5385869f47ed2674fd014afe40ce9ba22d5f5689ff5583282a2135276d2b7ccb54ef93137dba187c66d4

2 output(s) for total of 7.000000000000 xmr

stealth address amount amount idx tag
00: 2ccfe3d886a53b325190edc8286fda1f6238b4f6a70a24954ec1c4d6aa3fc560 2.000000000000 277734 of 434058 -
01: bdccff3079851556571776563fbc165a6905cae2b74b6a1c2ef69d31a3926df5 5.000000000000 175338 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-05-20 01:09:31 till 2015-06-28 02:45:32; resolution: 0.23 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 7.010000000000 xmr

key image 00: 12c58e4d0244eca7c6a7b2ccc1f364cf1c076ee4b8876f312c39196f941d9b15 amount: 0.010000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f574cf5331d653a4f893e1d47e97360d8402b6ee1d78f724042baceea5a9663f 00571300 0 0/4 2015-05-20 02:09:31 09:246:19:07:42
key image 01: 50b98a5f23c8dbd2eae69283556b05160be294c5a16119fa625d59112d2d54ea amount: 7.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 44e27914cfbf09729c13d445071d80593db96f77a2d76eef9a3255ef4ac3783c 00627035 1 6/4 2015-06-28 01:45:32 09:207:19:31:41
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 10000000000, "key_offsets": [ 375448 ], "k_image": "12c58e4d0244eca7c6a7b2ccc1f364cf1c076ee4b8876f312c39196f941d9b15" } }, { "key": { "amount": 7000000000000, "key_offsets": [ 80913 ], "k_image": "50b98a5f23c8dbd2eae69283556b05160be294c5a16119fa625d59112d2d54ea" } } ], "vout": [ { "amount": 2000000000000, "target": { "key": "2ccfe3d886a53b325190edc8286fda1f6238b4f6a70a24954ec1c4d6aa3fc560" } }, { "amount": 5000000000000, "target": { "key": "bdccff3079851556571776563fbc165a6905cae2b74b6a1c2ef69d31a3926df5" } } ], "extra": [ 2, 33, 0, 128, 149, 106, 181, 11, 1, 64, 59, 139, 57, 214, 12, 241, 225, 224, 161, 158, 209, 168, 55, 106, 109, 76, 83, 133, 134, 159, 71, 237, 38, 116, 253, 1, 74, 254, 64, 206, 155, 162, 45, 95, 86, 137, 255, 85, 131, 40, 42, 33, 53, 39, 109, 43, 124, 203, 84, 239, 147, 19, 125, 186, 24, 124, 102, 212 ], "signatures": [ "3a9fd8bb09030b08a700523e2e31659de2eb0f4c6fdf971f4d2428d46e3b0903cc5c77b7967d4b0fb0b75b8b1d3dcd19c97a63b4031da14bb56985cc69f9b208", "aee4826c4b82fd92454afe36ca654ca749af1313e3ad793c90fccf3b4aa22e0fc4fdb81e1a2dcca7728d8cd23a6bb045c4525fb70cbc4313c7afa54b4a1c0305"] }


Less details
source code | moneroexplorer