Monero Transaction b04fdb32042bbc03621576e02343a0fb3e97e8511e66255fa551956fadcbab32

Autorefresh is OFF

Tx hash: b04fdb32042bbc03621576e02343a0fb3e97e8511e66255fa551956fadcbab32

Tx prefix hash: b97c89b327417f37c2d20ec2c53b7d1733e5c78d5d126b6b2d88652a4f524fc6
Tx public key: ada45495bc2289767d8f6f89c7de31d8a5d560f41b5c208342e1e31787c23c3a
Payment id: 17039cd156402df9a2a735fa25d75fff861c86287626b65fb8673d1fa7a9b3e9

Transaction b04fdb32042bbc03621576e02343a0fb3e97e8511e66255fa551956fadcbab32 was carried out on the Monero network on 2014-12-30 05:18:44. The transaction has 2920180 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1419916724 Timestamp [UTC]: 2014-12-30 05:18:44 Age [y:d:h:m:s]: 09:334:11:54:00
Block: 369780 Fee (per_kB): 0.010000000000 (0.027089947090) Tx size: 0.3691 kB
Tx version: 1 No of confirmations: 2920180 RingCT/type: no
Extra: 02210017039cd156402df9a2a735fa25d75fff861c86287626b65fb8673d1fa7a9b3e901ada45495bc2289767d8f6f89c7de31d8a5d560f41b5c208342e1e31787c23c3a

5 output(s) for total of 19.990000000000 xmr

stealth address amount amount idx tag
00: b3deb3acec931ea6423cd2902a599d1112befbe6b3c04bc18f1fd4d747d0004f 0.090000000000 129129 of 317822 -
01: 94314db442684f918520524837c7f0d641ea8b68f69027ca70e0cbe5c0cbfd57 0.900000000000 185387 of 454894 -
02: 1b2f543329d02c49fc53d7c9bf68abbb731af7c66a2da19eb5a0f3ed2bf9e886 1.000000000000 376389 of 874629 -
03: 393d4ec9ee553006c007054c4e33fb53faf0cab7b3afe62883d27711277fb069 8.000000000000 28120 of 226902 -
04: 30c53bb009beb3afe2fc3b327d72f96d8bae8b99c625adc9b4fa33e7b75c0d1e 10.000000000000 428134 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-12-30 00:50:00 till 2014-12-30 02:50:00; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|

1 inputs(s) for total of 20.000000000000 xmr

key image 00: 39eebc31f43f1ffcda13b43d794658f13956dd69c9cbe3986436c0d25c78c725 amount: 20.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 499bd21d2c52c1c3c3dd6168525fe58efd34b1ca9e5cfc44586a86c14a43fd28 00369587 1 5/51 2014-12-30 01:50:00 09:334:15:22:44
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 20000000000000, "key_offsets": [ 24340 ], "k_image": "39eebc31f43f1ffcda13b43d794658f13956dd69c9cbe3986436c0d25c78c725" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "b3deb3acec931ea6423cd2902a599d1112befbe6b3c04bc18f1fd4d747d0004f" } }, { "amount": 900000000000, "target": { "key": "94314db442684f918520524837c7f0d641ea8b68f69027ca70e0cbe5c0cbfd57" } }, { "amount": 1000000000000, "target": { "key": "1b2f543329d02c49fc53d7c9bf68abbb731af7c66a2da19eb5a0f3ed2bf9e886" } }, { "amount": 8000000000000, "target": { "key": "393d4ec9ee553006c007054c4e33fb53faf0cab7b3afe62883d27711277fb069" } }, { "amount": 10000000000000, "target": { "key": "30c53bb009beb3afe2fc3b327d72f96d8bae8b99c625adc9b4fa33e7b75c0d1e" } } ], "extra": [ 2, 33, 0, 23, 3, 156, 209, 86, 64, 45, 249, 162, 167, 53, 250, 37, 215, 95, 255, 134, 28, 134, 40, 118, 38, 182, 95, 184, 103, 61, 31, 167, 169, 179, 233, 1, 173, 164, 84, 149, 188, 34, 137, 118, 125, 143, 111, 137, 199, 222, 49, 216, 165, 213, 96, 244, 27, 92, 32, 131, 66, 225, 227, 23, 135, 194, 60, 58 ], "signatures": [ "6a2ca7165430d47d2bfea7f382d74cd8e049674457430df26f7c103d280e370ffa93e5b7c6fc23505dcc8b377fe7577f965ee7c43b26487dfd3e7008e977260b"] }


Less details
source code | moneroexplorer