Monero Transaction ba38fbdd01891e4d839d43b1e0ec00a476c6ad16d53bef35de7039e9da4d2739

Autorefresh is OFF

Tx hash: ba38fbdd01891e4d839d43b1e0ec00a476c6ad16d53bef35de7039e9da4d2739

Tx prefix hash: 166e5ea3a07f02bd2fcd1516d283fda785aac88236a655c5c9e9872c85e07b85
Tx public key: 29c94880c430590f264014b82031a784ef1b6966e023b46c41c5e32b79c078d0

Transaction ba38fbdd01891e4d839d43b1e0ec00a476c6ad16d53bef35de7039e9da4d2739 was carried out on the Monero network on 2014-06-16 15:15:31. The transaction has 3154392 confirmations. Total output fee is 0.005300000000 XMR.

Timestamp: 1402931731 Timestamp [UTC]: 2014-06-16 15:15:31 Age [y:d:h:m:s]: 10:099:23:43:25
Block: 88017 Fee (per_kB): 0.005300000000 (0.014869041096) Tx size: 0.3564 kB
Tx version: 1 No of confirmations: 3154392 RingCT/type: no
Extra: 0129c94880c430590f264014b82031a784ef1b6966e023b46c41c5e32b79c078d0

3 output(s) for total of 0.035000000000 xmr

stealth address amount amount idx tag
00: 326d2b2ef9b7133214c77506e4fa7b908de37b6343a88e443eb14d158c9c9098 0.005000000000 145059 of 308584 -
01: 728e23215f3f87103a557c3a560b0153f18b1c95cc60ec025e8f1f82e5b97fb9 0.010000000000 256745 of 502466 -
02: 0df50559588ae565cf421b5007e4bf0bb6be6c94e7d856724227869cd062cfd6 0.020000000000 158241 of 381490 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-02 03:56:56 till 2014-06-16 06:10:32; resolution: 0.08 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 0.040300000000 xmr

key image 00: 3c282dd5f9148399aa12ad536e7ac92add38b03ca3e491477a191c9b6c519038 amount: 0.000300000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a5d518c7cd6e5a61c61e98276013c26ec666f6f1d76b1b2ebfb9ef4d8f0bc3a9 00067103 0 0/8 2014-06-02 04:56:56 10:114:10:02:00
key image 01: ce5ae9357aa82503020ed102cd0dd8e3e6acc523541c261a151b6ab439f363dd amount: 0.040000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8d1cfc4d03ebc6ead35e04ec710e46ea45a487953b8878f59e8e0ebb45ee0825 00087346 1 11/132 2014-06-16 05:10:32 10:100:09:48:24
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 300000000, "key_offsets": [ 27468 ], "k_image": "3c282dd5f9148399aa12ad536e7ac92add38b03ca3e491477a191c9b6c519038" } }, { "key": { "amount": 40000000000, "key_offsets": [ 88133 ], "k_image": "ce5ae9357aa82503020ed102cd0dd8e3e6acc523541c261a151b6ab439f363dd" } } ], "vout": [ { "amount": 5000000000, "target": { "key": "326d2b2ef9b7133214c77506e4fa7b908de37b6343a88e443eb14d158c9c9098" } }, { "amount": 10000000000, "target": { "key": "728e23215f3f87103a557c3a560b0153f18b1c95cc60ec025e8f1f82e5b97fb9" } }, { "amount": 20000000000, "target": { "key": "0df50559588ae565cf421b5007e4bf0bb6be6c94e7d856724227869cd062cfd6" } } ], "extra": [ 1, 41, 201, 72, 128, 196, 48, 89, 15, 38, 64, 20, 184, 32, 49, 167, 132, 239, 27, 105, 102, 224, 35, 180, 108, 65, 197, 227, 43, 121, 192, 120, 208 ], "signatures": [ "f1b0e034ea9b26cf829e1bde6bef0846f7ad4f7b82a9dda12b5a61a3ee0aeb0371fc06ab99b112fcea85ac1ad027564f16619cb2aa5f76f63268bf7f02e82601", "58b27e99963a47e515954e2357b5f1dea9efdba5431bff5260dda49763fd5c046835fab0fc477c50fd28283a094198b4d7064fd991e86abe5c91d4f2c040c709"] }


Less details
source code | moneroexplorer