Monero Transaction e3973e30639dd052a8648e1bae90df2f106f55bee80b945119b15a28485990fa

Autorefresh is OFF

Tx hash: e3973e30639dd052a8648e1bae90df2f106f55bee80b945119b15a28485990fa

Tx prefix hash: f3e91ed342b9a0d37e15315f6652bcd249d4818a594234f319c512fa18dd51a0
Tx public key: e44bda529ad5f1fd5dcb34a46f27d3f8fccea33b7aa04af36ae175c37d208dbb
Payment id: 0dadede9e4150a18413199d73cd2d8ebabb0122d183cf581ca7bd041e1131da8

Transaction e3973e30639dd052a8648e1bae90df2f106f55bee80b945119b15a28485990fa was carried out on the Monero network on 2014-07-02 15:08:58. The transaction has 3168932 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1404313738 Timestamp [UTC]: 2014-07-02 15:08:58 Age [y:d:h:m:s]: 10:136:12:43:01
Block: 111245 Fee (per_kB): 0.005000000000 (0.015753846154) Tx size: 0.3174 kB
Tx version: 1 No of confirmations: 3168932 RingCT/type: no
Extra: 0221000dadede9e4150a18413199d73cd2d8ebabb0122d183cf581ca7bd041e1131da801e44bda529ad5f1fd5dcb34a46f27d3f8fccea33b7aa04af36ae175c37d208dbb

1 output(s) for total of 0.500000000000 xmr

stealth address amount amount idx tag
00: 6920a23cd76aa36436611a5a58f38dda13458eddcd77b0d3bf1d975e43cfeb1e 0.500000000000 83841 of 1118624 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-30 17:10:04 till 2014-07-02 10:04:47; resolution: 0.01 days)

  • |_____*____________________________________________________________________________________________________________________________________________________________________|
  • |_____________________________________________________________________________________________________________________________________________________________________*____|

2 inputs(s) for total of 0.505000000000 xmr

key image 00: d9f9fe39549dadac468d55082bfdc4d50d90ac6c7dbca1067edee602f24cf8e2 amount: 0.005000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5d8a4f574572632392244e96d23e933d7d5df46c5fb85d965c06603445807def 00108502 1 11/4 2014-06-30 18:10:04 10:138:09:41:55
key image 01: 795173ce37f93a30c5a150e3dba27986f7436a53d28b0ad6937c1f3a31daec35 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7f32b9c29fd1ca6ee67752b3e1bc6bf99b9647002b13d2d537198b1bf05c1ad3 00110894 1 19/64 2014-07-02 09:04:47 10:136:18:47:12
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000, "key_offsets": [ 180577 ], "k_image": "d9f9fe39549dadac468d55082bfdc4d50d90ac6c7dbca1067edee602f24cf8e2" } }, { "key": { "amount": 500000000000, "key_offsets": [ 83026 ], "k_image": "795173ce37f93a30c5a150e3dba27986f7436a53d28b0ad6937c1f3a31daec35" } } ], "vout": [ { "amount": 500000000000, "target": { "key": "6920a23cd76aa36436611a5a58f38dda13458eddcd77b0d3bf1d975e43cfeb1e" } } ], "extra": [ 2, 33, 0, 13, 173, 237, 233, 228, 21, 10, 24, 65, 49, 153, 215, 60, 210, 216, 235, 171, 176, 18, 45, 24, 60, 245, 129, 202, 123, 208, 65, 225, 19, 29, 168, 1, 228, 75, 218, 82, 154, 213, 241, 253, 93, 203, 52, 164, 111, 39, 211, 248, 252, 206, 163, 59, 122, 160, 74, 243, 106, 225, 117, 195, 125, 32, 141, 187 ], "signatures": [ "553cfe426a095175e997284b41fb814d11a452ba3b522de359d3905a02f859089d826e640bca1b09084ef952510313bc8c096da107c260889347194b5ac0ef0f", "8dc15ca1ca5f1cda2668177bb60f25acc350b7dcd2edc83562d2e41c591d140b8c31d4fc2bf4dbb21ec2a8bb452441c545910e8808fc816916d16dba9fd10703"] }


Less details
source code | moneroexplorer