Monero Transaction b342d4a1ef5980abc2e6265ce37d6967e5df34f5bad70f879fbef90f0c6080a8

Autorefresh is OFF

Tx hash: b342d4a1ef5980abc2e6265ce37d6967e5df34f5bad70f879fbef90f0c6080a8

Tx public key: 5f73f7be7887e0f6acbd1297aa4082e36c3e27b3b1e964127fe71c2bfa5325de
Payment id: 9a56f0cfe5f47fba028eee6fb92feadde900b10c5e7a23076a5237bc9b8af1dd

Transaction b342d4a1ef5980abc2e6265ce37d6967e5df34f5bad70f879fbef90f0c6080a8 was carried out on the Monero network on 2014-05-30 10:14:23. The transaction has 3243706 confirmations. Total output fee is 0.000001000000 XMR.

Timestamp: 1401444863 Timestamp [UTC]: 2014-05-30 10:14:23 Age [y:d:h:m:s]: 10:206:12:52:59
Block: 62985 Fee (per_kB): 0.000001000000 (0.000000819200) Tx size: 1.2207 kB
Tx version: 1 No of confirmations: 3243706 RingCT/type: no
Extra: 0221009a56f0cfe5f47fba028eee6fb92feadde900b10c5e7a23076a5237bc9b8af1dd015f73f7be7887e0f6acbd1297aa4082e36c3e27b3b1e964127fe71c2bfa5325de

6 output(s) for total of 0.996893000000 xmr

stealth address amount amount idx tag
00: d99f64868d4bdfcdca13fabf4dc9b4dcb90f5418a48f51ca1d08808ba1465ecc 0.000003000000 11739 of 42341 -
01: 141f2e20674f3ab8e96401fe9bbb0ea1d680c75f6fbcda10e6fe7e7a2811cf5e 0.000090000000 27126 of 61123 -
02: 0030ad59184ed320d47af5c6a43ceb2176f8112808ceeae72b26769be7cff1fa 0.000800000000 25904 of 78160 -
03: 48745bbbe0892e64d8397026ac19c6953dfe80c6b0f200e40ab3d6673a969e33 0.006000000000 29829 of 256624 -
04: f8673ea8a6b94a2bd7774ad51067394a895dc7d084fed284412f190e9e767eeb 0.090000000000 13903 of 317822 -
05: 99b4f9c8ee34c2edaed514fe5b8577d7328c223c75da147d59394c0fe9a41b03 0.900000000000 9466 of 454894 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



9 inputs(s) for total of 0.996894000000 xmr

key image 00: c6f1da4368ccf5f4b2cc27b1a13246592306b3f31720a903c5e091e001a9afe4 amount: 0.000200000000
ring members blk
- 00: 4b6ac385490e5d6fc95a21d4087277437bb8cfe3efaa1eca8b0cbfc2a4441394 00062923
key image 01: 881d9a854b032c1124a5eeeb42391c966fa377dd74d18b2d6aa899d53e161985 amount: 0.000060000000
ring members blk
- 00: 7312b64e84891c5bf05b8bd9868d080a31fcd9d07e9417a4cbf7d4e696755ad8 00057722
key image 02: 3502bad7e0ec9377a21ddde38b6faa9f20eb8d877b215ea07a17105a46870948 amount: 0.003000000000
ring members blk
- 00: 8f7bf19ded9bdcbfc1dd9bbac098d5f42cdec2462d5a9eec29917cb113330246 00057722
key image 03: a4df23ac97622e738ff4fc403c95c02e34af77827323bb2dbdf925603c4abc27 amount: 0.000600000000
ring members blk
- 00: 92df58c486d9acbfabadd5b5cc80c3a3bc87f3bee9d89ae7670480f7e04959da 00057722
key image 04: 947a2f30e0d632371a8f89a35f6eb7fc960c981946f4f59871ed9c30985da3cf amount: 0.000004000000
ring members blk
- 00: 390780b8876bdf3980e33f7695074fc49814dfb0b7a06e5d85f7e8f2802bae65 00062923
key image 05: eed8bc057d48ad77afba2a28619be556b746bae3d47fbb722ac696e5db4c0760 amount: 0.900000000000
ring members blk
- 00: e3e6ae7f765bbd7dea8ffc16db484bcfa53ddbf7a6be71970f5116393984bc16 00062923
key image 06: 31c808602bef61bd48dd9fde92cbd8c5f2b0f7d6e5e7a4149bc7a2c07f62e51d amount: 0.003000000000
ring members blk
- 00: ac943f0e2e08d6775ddef7209ea1606eec975192c363f2bbfcbc9d17d410e819 00062923
key image 07: e693fa8329a881533e8804d83ff6aa2076064dfe312a9a5c55aa22811c2c8701 amount: 0.000030000000
ring members blk
- 00: d930762b6edf0a5a8f5a741a4153a8e0b61be15680e62f602d968a51946bc814 00062923
key image 08: ec863097bd8f666ce4f0bebab3f206fad94984d0dda16a1ee56e0f38ab599bd6 amount: 0.090000000000
ring members blk
- 00: 1521f8c94086f5ec8bfa21e817457df170026ea27a7d857d32f47af4f36421d3 00062923
More details
source code | moneroexplorer