Monero Transaction d34ae5a16839af30fda4aa13eff5ba5237abbfe0952b6e224f87219547635c9c

Autorefresh is OFF

Tx hash: d34ae5a16839af30fda4aa13eff5ba5237abbfe0952b6e224f87219547635c9c

Tx prefix hash: 0de66b581934afa7aae184937250b4b0bc328263261ff4c6ab8a5458354009af
Tx public key: 40e6433cfd3d2a3dc7f32b184a5230fcc5881fc26a295365a7051e96776325b5
Payment id: 4749e8fb9bc84fc18c7bfc031f1ccb5205799fc107244280919cc33092335bdb

Transaction d34ae5a16839af30fda4aa13eff5ba5237abbfe0952b6e224f87219547635c9c was carried out on the Monero network on 2014-12-30 04:27:21. The transaction has 2924708 confirmations. Total output fee is 0.017119492320 XMR.

Timestamp: 1419913641 Timestamp [UTC]: 2014-12-30 04:27:21 Age [y:d:h:m:s]: 09:340:16:05:15
Block: 369725 Fee (per_kB): 0.017119492320 (0.029762920434) Tx size: 0.5752 kB
Tx version: 1 No of confirmations: 2924708 RingCT/type: no
Extra: 0221004749e8fb9bc84fc18c7bfc031f1ccb5205799fc107244280919cc33092335bdb0140e6433cfd3d2a3dc7f32b184a5230fcc5881fc26a295365a7051e96776325b5

5 output(s) for total of 10.140000000000 xmr

stealth address amount amount idx tag
00: 17096f101ae7c6ad9606ed23ea4b409876614b50b627a1a12df3f39edf44eca6 0.040000000000 149015 of 294095 -
01: 666f482489afd9ef62998ce5652f2ca5bb7f644aa882d150a8d5664dbcc4991f 0.300000000000 394879 of 976536 -
02: b625ad8bc987b71d10a18790e9a78d3c688a2c47de4a4613f4bcd89b029702c0 0.800000000000 227013 of 489955 -
03: 0bd720a43ed866197d8690574321f368bdb35efa1298fd2275902d2b506dd7b5 4.000000000000 139810 of 237197 -
04: e721f76c44c3e46bc88a928e97e39295fbd4e5e25168bc8954c32b619b9ef3e7 5.000000000000 136517 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-12-30 00:01:55 till 2014-12-30 02:50:49; resolution: 0.00 days)

  • |_____________________________________________________________________________________________________________*____________________________________________________________|
  • |______________________________________________________________________________________*___________________________________________________________________________________|
  • |_____________________________________________________________*____________________________________________________________________________________________________________|

3 inputs(s) for total of 10.157119492320 xmr

key image 00: 0b7304a2640cb87363e246f42dbae39f8bd73e77fd53bb5d68d54c82e0c3d4dd amount: 0.060000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ffb21081b1946bac2704899931c90a9e07c1c265b8b468991a62c4f01bc0bea0 00369588 1 2/3 2014-12-30 01:50:49 09:340:18:41:47
key image 01: 74d44a67d25d93d0096ff098358d0561ab40218641f88547ffeaa41e8f4eb72c amount: 0.097119492320
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: af151c0a51b4091f3042f0e153cb6e212320bd46965bd8d01e9b6fb9ad401def 00369566 0 0/4 2014-12-30 01:27:38 09:340:19:04:58
key image 02: 040503714b5b2be441b3d32fd92d70d271cb45aa2afa3613349dba2cdf23befd amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b6e6dd5ca1cfac8b7cab32e71122b581639125356e89fbe668353fa03f11044d 00369547 0 0/4 2014-12-30 01:01:55 09:340:19:30:41
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 60000000000, "key_offsets": [ 119692 ], "k_image": "0b7304a2640cb87363e246f42dbae39f8bd73e77fd53bb5d68d54c82e0c3d4dd" } }, { "key": { "amount": 97119492320, "key_offsets": [ 0 ], "k_image": "74d44a67d25d93d0096ff098358d0561ab40218641f88547ffeaa41e8f4eb72c" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 427885 ], "k_image": "040503714b5b2be441b3d32fd92d70d271cb45aa2afa3613349dba2cdf23befd" } } ], "vout": [ { "amount": 40000000000, "target": { "key": "17096f101ae7c6ad9606ed23ea4b409876614b50b627a1a12df3f39edf44eca6" } }, { "amount": 300000000000, "target": { "key": "666f482489afd9ef62998ce5652f2ca5bb7f644aa882d150a8d5664dbcc4991f" } }, { "amount": 800000000000, "target": { "key": "b625ad8bc987b71d10a18790e9a78d3c688a2c47de4a4613f4bcd89b029702c0" } }, { "amount": 4000000000000, "target": { "key": "0bd720a43ed866197d8690574321f368bdb35efa1298fd2275902d2b506dd7b5" } }, { "amount": 5000000000000, "target": { "key": "e721f76c44c3e46bc88a928e97e39295fbd4e5e25168bc8954c32b619b9ef3e7" } } ], "extra": [ 2, 33, 0, 71, 73, 232, 251, 155, 200, 79, 193, 140, 123, 252, 3, 31, 28, 203, 82, 5, 121, 159, 193, 7, 36, 66, 128, 145, 156, 195, 48, 146, 51, 91, 219, 1, 64, 230, 67, 60, 253, 61, 42, 61, 199, 243, 43, 24, 74, 82, 48, 252, 197, 136, 31, 194, 106, 41, 83, 101, 167, 5, 30, 150, 119, 99, 37, 181 ], "signatures": [ "233da4b4768a05abee2459bcdf6cc3fe65d661b3503911de9d5732471832be054e630f4f46739466900a5086f556a190cc018275d0b230c54e84c4a407e5c006", "355778afa3d05c59f01dcfc722c40c756fb1338718b3753eac00e6b2d4fb96077b28d4a2a4181b5386456c4dc023944653e10d87ca314af4ff7d2b3aa8b5ac04", "b33d50790821e145dfc95ef16138d69e171e290e8792044243bbee84b3b9100835d1a15ed884ab9b79b70ecc1df0c5178822d6ca3f7b5a3f963f0e8f7ce16303"] }


Less details
source code | moneroexplorer