Monero Transaction 934cfe19b505885476967ba6247f23f29c21a22c897c5b094d412956b1ded822

Autorefresh is OFF

Tx hash: 934cfe19b505885476967ba6247f23f29c21a22c897c5b094d412956b1ded822

Tx prefix hash: 0e7bfde4959c347b1205808ed373d12380cf28d44f376ca44ac3c6e95bb2561e
Tx public key: 275d86743d4fab1956878de12ca737b291c367ee7dd90a7b1abd84a3a706f79f

Transaction 934cfe19b505885476967ba6247f23f29c21a22c897c5b094d412956b1ded822 was carried out on the Monero network on 2014-06-12 12:58:38. The transaction has 3198915 confirmations. Total output fee is 0.005704854876 XMR.

Timestamp: 1402577918 Timestamp [UTC]: 2014-06-12 12:58:38 Age [y:d:h:m:s]: 10:157:15:44:11
Block: 82021 Fee (per_kB): 0.005704854876 (0.012221279065) Tx size: 0.4668 kB
Tx version: 1 No of confirmations: 3198915 RingCT/type: no
Extra: 01275d86743d4fab1956878de12ca737b291c367ee7dd90a7b1abd84a3a706f79f

6 output(s) for total of 0.894870000000 xmr

stealth address amount amount idx tag
00: 069274b440086cad6512f16bd35848bf4a570a2b42ba86e64439b9bfe1150369 0.002010000000 279 of 393 -
01: 66df52378005226efba7e003ee47c75af2d9577c6286b61e1c52fdffe5d58e11 0.002010000000 280 of 393 -
02: 6030f61674af535fe49585fea2ad3dd441108d32578d2d1dcd546198f2bc24ab 0.003850000000 267 of 397 -
03: 834ed14ed3962f04e27a84e3f334ece81c860f79f7286b90c05109f1491219e4 0.007000000000 86919 of 247340 -
04: 8155e1eb61ba0b60947eb542623f3b414307654e5f7aeabc8c824c1f25b6262f 0.080000000000 39163 of 269576 -
05: e38e28dd99957fff5af7b63033e8dc1854c3fe572c2466d77d156b428fec2584 0.800000000000 15705 of 489955 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-12 00:21:40 till 2014-06-12 13:29:18; resolution: 0.00 days)

  • |_____________*____________________________________________________________________________________________________________________________________________________________|
  • |_____________________________________________________________________________________________________________________________________________________________*____________|

2 inputs(s) for total of 0.900574854876 xmr

key image 00: 3f0878b56d432c6aab917a5ab976e956fad0d4c7731b072884fdbc19e31f202d amount: 0.000574854876
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3e042fdacc7a241f38bbb34778effd3ae0a87f2081a073a79f78d46d6ff12a37 00081260 0 0/6 2014-06-12 01:21:40 10:158:03:21:09
key image 01: d25eccd1249d28e3e898ed00675ae882d36031de919d0f4f57b53e33b2e59347 amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c92491d0de60b1cee48570a3233581da6ead2735d713bcf62eb48676c4a48298 00081992 1 9/32 2014-06-12 12:29:18 10:157:16:13:31
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 574854876, "key_offsets": [ 0 ], "k_image": "3f0878b56d432c6aab917a5ab976e956fad0d4c7731b072884fdbc19e31f202d" } }, { "key": { "amount": 900000000000, "key_offsets": [ 15816 ], "k_image": "d25eccd1249d28e3e898ed00675ae882d36031de919d0f4f57b53e33b2e59347" } } ], "vout": [ { "amount": 2010000000, "target": { "key": "069274b440086cad6512f16bd35848bf4a570a2b42ba86e64439b9bfe1150369" } }, { "amount": 2010000000, "target": { "key": "66df52378005226efba7e003ee47c75af2d9577c6286b61e1c52fdffe5d58e11" } }, { "amount": 3850000000, "target": { "key": "6030f61674af535fe49585fea2ad3dd441108d32578d2d1dcd546198f2bc24ab" } }, { "amount": 7000000000, "target": { "key": "834ed14ed3962f04e27a84e3f334ece81c860f79f7286b90c05109f1491219e4" } }, { "amount": 80000000000, "target": { "key": "8155e1eb61ba0b60947eb542623f3b414307654e5f7aeabc8c824c1f25b6262f" } }, { "amount": 800000000000, "target": { "key": "e38e28dd99957fff5af7b63033e8dc1854c3fe572c2466d77d156b428fec2584" } } ], "extra": [ 1, 39, 93, 134, 116, 61, 79, 171, 25, 86, 135, 141, 225, 44, 167, 55, 178, 145, 195, 103, 238, 125, 217, 10, 123, 26, 189, 132, 163, 167, 6, 247, 159 ], "signatures": [ "d7b2e06b01f7c8f9bcfbbdec8b475c63b68b52c8fe453954ea7f7f715e32250700a0fc3ab484f2f89f17f273b7c758fb0568fe4bb06ad4922e7d13f8ea2c530e", "28fcc68ec29696a9a6da5f861c684b3c97a1cd7c5f9d8ad862c7fcc951e2ad0e9149e2dd494329a7c656104e3bd07923c3b5bf51792caf22c3411f75c1e9b400"] }


Less details
source code | moneroexplorer