Monero Transaction b3f3bc45292c7a588a2ddcfd26d41dd95d93646ef1838be54722f01f889ff4de

Autorefresh is OFF

Tx hash: b3f3bc45292c7a588a2ddcfd26d41dd95d93646ef1838be54722f01f889ff4de

Tx prefix hash: 43a68413a24bfebec67bfb997146616176099c1e37b144085ec3bc86fe4186d0
Tx public key: 079e3c39e5d6e983c4ea7a93f29263f459d2242575c5222d235a9f4bc954c2a5
Payment id: bc3880ab7b1745f9829c77cc131573f9e33b77b0167a4581a473a220a3903b9c

Transaction b3f3bc45292c7a588a2ddcfd26d41dd95d93646ef1838be54722f01f889ff4de was carried out on the Monero network on 2014-11-17 10:59:08. The transaction has 2994288 confirmations. Total output fee is 0.142386250000 XMR.

Timestamp: 1416221948 Timestamp [UTC]: 2014-11-17 10:59:08 Age [y:d:h:m:s]: 10:030:12:39:10
Block: 308778 Fee (per_kB): 0.142386250000 (0.302496929461) Tx size: 0.4707 kB
Tx version: 1 No of confirmations: 2994288 RingCT/type: no
Extra: 022100bc3880ab7b1745f9829c77cc131573f9e33b77b0167a4581a473a220a3903b9c01079e3c39e5d6e983c4ea7a93f29263f459d2242575c5222d235a9f4bc954c2a5

5 output(s) for total of 19.879000000000 xmr

stealth address amount amount idx tag
00: d56fda336f0f9539e18910bf19b205c3284b1776aca883183bfe389711f9ff70 0.079000000000 1 of 6 -
01: aa7e116cda96b37f9130dde00e82d8110f678326f806dcfa4942341303fbf1a3 0.300000000000 338215 of 976536 -
02: 3d14f2ff1b124cb79bc8bcfa4a87c479cb9a9c43b1ffca05e34e33078e8cc192 0.500000000000 462855 of 1118624 -
03: 0371df3c6e55fddd0e32c2444fea5d2db9be5a424c82947fc849f1627ec18e5e 9.000000000000 26379 of 274259 -
04: b95d894bf73b626941151568fa63ccb8e5665e5ea7eb64e850f688774bdbac66 10.000000000000 358927 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-10-28 07:15:04 till 2014-11-11 05:25:12; resolution: 0.08 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 20.021386250000 xmr

key image 00: 28505acb2c23224f1ffac554fb5ef6ef3f2aa12898a244757952707f60e86021 amount: 0.021386250000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 92ac4315fbccfe4566394a1e5bdc8680fd9cbd0a2f9c722181345753c32d5065 00280056 1 3/4 2014-10-28 08:15:04 10:050:15:23:14
key image 01: 1913dea1a33d073595d3dcdd53e28a0d4da6a1fe4d88e3940df534687c70a8f7 amount: 20.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 973ddd9f8c781101d5d358f7a96a5c9149e9648c6327cb0e699815783a2d3209 00299787 1 8/4 2014-11-11 04:25:12 10:036:19:13:06
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 21386250000, "key_offsets": [ 0 ], "k_image": "28505acb2c23224f1ffac554fb5ef6ef3f2aa12898a244757952707f60e86021" } }, { "key": { "amount": 20000000000000, "key_offsets": [ 20201 ], "k_image": "1913dea1a33d073595d3dcdd53e28a0d4da6a1fe4d88e3940df534687c70a8f7" } } ], "vout": [ { "amount": 79000000000, "target": { "key": "d56fda336f0f9539e18910bf19b205c3284b1776aca883183bfe389711f9ff70" } }, { "amount": 300000000000, "target": { "key": "aa7e116cda96b37f9130dde00e82d8110f678326f806dcfa4942341303fbf1a3" } }, { "amount": 500000000000, "target": { "key": "3d14f2ff1b124cb79bc8bcfa4a87c479cb9a9c43b1ffca05e34e33078e8cc192" } }, { "amount": 9000000000000, "target": { "key": "0371df3c6e55fddd0e32c2444fea5d2db9be5a424c82947fc849f1627ec18e5e" } }, { "amount": 10000000000000, "target": { "key": "b95d894bf73b626941151568fa63ccb8e5665e5ea7eb64e850f688774bdbac66" } } ], "extra": [ 2, 33, 0, 188, 56, 128, 171, 123, 23, 69, 249, 130, 156, 119, 204, 19, 21, 115, 249, 227, 59, 119, 176, 22, 122, 69, 129, 164, 115, 162, 32, 163, 144, 59, 156, 1, 7, 158, 60, 57, 229, 214, 233, 131, 196, 234, 122, 147, 242, 146, 99, 244, 89, 210, 36, 37, 117, 197, 34, 45, 35, 90, 159, 75, 201, 84, 194, 165 ], "signatures": [ "a6f99380f975e087f2aab38a8e4e1c13b79657f66dea3623377e3a060fc17b0ca7c73ef71487d50ba40eb0c87c1fe374498f7318526611769e1ab8716e1a6b01", "fa03b7a156ae71015edccc6cb9005fc0d1c2f769c930800dcbd9128aba5100015db0629498d8d56c2fa126e15e570955146d5a75afbae8d7c0f251e24f144005"] }


Less details
source code | moneroexplorer