Monero Transaction b34b934ffb186f5879a4f1742936fae1709a538a8a1e17d7fbcb0de532b8647e

Autorefresh is OFF

Tx hash: b34b934ffb186f5879a4f1742936fae1709a538a8a1e17d7fbcb0de532b8647e

Tx prefix hash: d5efbefa2a441333515eee9597967b064d4b4e106b6ae4be7dc768877b68086c
Tx public key: 11313e5565c81b82129f4bf87b3f785006ce92611a4f8c8d618e2ce268554387
Payment id: ec48a4a982e34e564bc0f05fcf8736fdee346ef16a70011bf1621e61ab963e74

Transaction b34b934ffb186f5879a4f1742936fae1709a538a8a1e17d7fbcb0de532b8647e was carried out on the Monero network on 2016-12-08 18:49:46. The transaction has 2098964 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1481222986 Timestamp [UTC]: 2016-12-08 18:49:46 Age [y:d:h:m:s]: 07:363:08:47:02
Block: 1197057 Fee (per_kB): 0.010000000000 (0.013617021277) Tx size: 0.7344 kB
Tx version: 1 No of confirmations: 2098964 RingCT/type: no
Extra: 022100ec48a4a982e34e564bc0f05fcf8736fdee346ef16a70011bf1621e61ab963e740111313e5565c81b82129f4bf87b3f785006ce92611a4f8c8d618e2ce268554387

5 output(s) for total of 9.090000000000 xmr

stealth address amount amount idx tag
00: c569f7ee1444bcfcde1673418b6de94d0583bd67e39efba9131b591c3660b233 0.090000000000 290346 of 317822 -
01: 950eaf792af348d3a39f7f18e4d73db7730258213ea545bd63ff6a1cb074d9c3 0.400000000000 661122 of 688584 -
02: 88e6f1c3fac3c64f7d306654391818aa897a0ef1a6289654e2ba8591cde26035 0.600000000000 634420 of 650760 -
03: b14c33ae4ca1b757f2100dfa549dad17074e77a0eec41dc43436dc0c9f0ce2de 1.000000000000 843671 of 874629 -
04: 6b90d2473783470fd2e5b2c7e234f77efd1e26622dd3c70a4eebed88b92a38db 7.000000000000 277258 of 285521 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-10-09 16:59:17 till 2016-12-08 08:47:51; resolution: 4.65 days)

  • |_*_______________________________________________*_______________________________________________________________________________________________________________________*|
  • |______________________________________________________________________*___________________________________________________________________________________________*______*|

2 inputs(s) for total of 9.100000000000 xmr

key image 00: 1c56caa29f8a075dd47e3ea8782e929fd54464734f25ba0c51d532e6a38b9298 amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 53e83675ee2c537ea3033c85c2cfffdfb9fbc26009d5eb230c50a7bb3dbc4884 00253598 1 2/4 2014-10-09 17:59:17 10:059:09:37:31
- 01: caa54ab2c5d9875c31b93e45963069ab552c43117b181167c877375af5abe91f 00574691 0 0/4 2015-05-22 10:25:22 09:199:17:11:26
- 02: 9d01019da0fcc73be4152d7b57d0f4335d99b74aef5e29962dae7dc362638dc9 01196396 3 10/5 2016-12-07 21:53:00 07:364:05:43:48
key image 01: 820148bf9d121b91354d91c83e8e40b04f443fec00d255cc7b6f45ed8f49b769 amount: 9.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8fa13e37742359f6413b351774f2de52597ef913f805fe33afa4f94a93668610 00718614 4 74/10 2015-08-31 05:41:38 09:098:21:55:10
- 01: 534be28235e177f2b2a59bddc8981f81ad6097f68a66eae1374710a2fa695696 01170332 3 2/15 2016-11-01 17:34:02 08:035:10:02:46
- 02: c6a5ffa4f74e7df39951101186355950e10ff5ce624ac34ee3aed45375858c61 01196659 0 0/4 2016-12-08 07:47:51 07:363:19:48:57
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 100000000000, "key_offsets": [ 590640, 161548, 201067 ], "k_image": "1c56caa29f8a075dd47e3ea8782e929fd54464734f25ba0c51d532e6a38b9298" } }, { "key": { "amount": 9000000000000, "key_offsets": [ 164957, 44702, 32215 ], "k_image": "820148bf9d121b91354d91c83e8e40b04f443fec00d255cc7b6f45ed8f49b769" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "c569f7ee1444bcfcde1673418b6de94d0583bd67e39efba9131b591c3660b233" } }, { "amount": 400000000000, "target": { "key": "950eaf792af348d3a39f7f18e4d73db7730258213ea545bd63ff6a1cb074d9c3" } }, { "amount": 600000000000, "target": { "key": "88e6f1c3fac3c64f7d306654391818aa897a0ef1a6289654e2ba8591cde26035" } }, { "amount": 1000000000000, "target": { "key": "b14c33ae4ca1b757f2100dfa549dad17074e77a0eec41dc43436dc0c9f0ce2de" } }, { "amount": 7000000000000, "target": { "key": "6b90d2473783470fd2e5b2c7e234f77efd1e26622dd3c70a4eebed88b92a38db" } } ], "extra": [ 2, 33, 0, 236, 72, 164, 169, 130, 227, 78, 86, 75, 192, 240, 95, 207, 135, 54, 253, 238, 52, 110, 241, 106, 112, 1, 27, 241, 98, 30, 97, 171, 150, 62, 116, 1, 17, 49, 62, 85, 101, 200, 27, 130, 18, 159, 75, 248, 123, 63, 120, 80, 6, 206, 146, 97, 26, 79, 140, 141, 97, 142, 44, 226, 104, 85, 67, 135 ], "signatures": [ "29c909aa0b8ed94d8707214eb19467ef45047a631b99d3ce53c7111d4cba9c0f917a6317fcd81acdbc9b98f20e241018244c55bfba04e1e1fec9209f7b4e4507988b351642ff47ff852ae7a8fffc47d9ae4bb2d6cbd20709b6c1b57c8f441203a93c9fd5aa3e1636b41de8514506e525374882acc79fd8fd8266a675d036de00a58a09e27bd0c4d0dacf8af9244329eac038532e61eab43c378cb23e30b0c904a90abc4e35995170d6621a53d652af5a95a8e073a7ec4db030a8e72517d9a40c", "dc02003de542e5ae5407aa03985cbbc74e1a1b1888b2209640d66d341c34af0e2053f593155f403ced4cc5f5822a007cf12944df64576f2e9408f803db841906a493551467909d62a534b1a9e57fa83e1b7ca4db43c0b5be37dbb2c8a873ce092bd2d99e5b675de12824719734f19561ac998c293c4c244d99439ab07739ac0bc8022519001cf8c93f5413ed06b5513528d2326fed872972dc202939b5ee76034d7eb0a5638da80f85d25a8f03dc828620d3128dbd028097fbcd45e527f0000d"] }


Less details
source code | moneroexplorer