Monero Transaction f34aa0a7c3cc58a612c894c018993b019dc708349cef0ddeff6d49e490583ce6

Autorefresh is OFF

Tx hash: f34aa0a7c3cc58a612c894c018993b019dc708349cef0ddeff6d49e490583ce6

Tx prefix hash: 7e2b0dc5cf6713aa317d24b312d3031c6fb97c75ae83ef488ffa9135012cfeb9
Tx public key: 69a2ecf40b26b4f5ec4fe2a7adfbd003c0e2ab11427c99332e72f0160dee7cac
Payment id: 17b7e80a5aa0eb395ce88a1d3af104a1b699e9433e42a7c03a8c5a9849a5d479

Transaction f34aa0a7c3cc58a612c894c018993b019dc708349cef0ddeff6d49e490583ce6 was carried out on the Monero network on 2015-01-07 05:56:33. The transaction has 2920422 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1420610193 Timestamp [UTC]: 2015-01-07 05:56:33 Age [y:d:h:m:s]: 09:342:11:51:56
Block: 381079 Fee (per_kB): 0.100000000000 (0.210699588477) Tx size: 0.4746 kB
Tx version: 1 No of confirmations: 2920422 RingCT/type: no
Extra: 02210017b7e80a5aa0eb395ce88a1d3af104a1b699e9433e42a7c03a8c5a9849a5d4790169a2ecf40b26b4f5ec4fe2a7adfbd003c0e2ab11427c99332e72f0160dee7cac

5 output(s) for total of 169.900000000000 xmr

stealth address amount amount idx tag
00: 780645b6f7bf1bbd689003125a1efb4bbe0d1dca98d2fb95af5e12eb57d84be8 0.900000000000 187416 of 454894 -
01: 24e4ac6582a0377f38da6f3f2b476148a91d89a17e6c0e2146141985a4a9b1e0 9.000000000000 30940 of 274259 -
02: 2ce68dbf3625c7ad94e86d6ca00ee46e6563d6fa017a854842e55f0bad90600b 30.000000000000 13510 of 49201 -
03: 12f53fed731fe4e159c958f65e335cdf25a4c008ae0318ccac8f42f7298e4ec5 30.000000000000 13511 of 49201 -
04: bd90bac5f06ac7517202e1fb5e4cea0c785647445bb5918ec86735c4fd809e41 100.000000000000 10534 of 57197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-01-04 22:38:27 till 2015-01-05 17:06:07; resolution: 0.00 days)

  • |________________________________________________________________________________________________________________________________________________________________*_________|
  • |__________*_______________________________________________________________________________________________________________________________________________________________|

2 inputs(s) for total of 170.000000000000 xmr

key image 00: ef33c1d7ddee1b7feaf15591c6f650c83b70435db8e309e7e1fa46b9b2d5a888 amount: 80.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 48e337f693e2d60741ac01c9acc59d831626ae4ef1570af6ef4c4c58912d1787 00378987 1 1/5 2015-01-05 16:06:07 09:344:01:42:22
key image 01: a530a55989d1d7ac390db54a0957a9e14001fe94ce5a6bf64a34e21dfc97269d amount: 90.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c72b081c520db5152ea86ed120c2d9135fe0c24b89f9940a2ad759eae6f23a46 00378013 1 1/7 2015-01-04 23:38:27 09:344:18:10:02
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 80000000000000, "key_offsets": [ 4329 ], "k_image": "ef33c1d7ddee1b7feaf15591c6f650c83b70435db8e309e7e1fa46b9b2d5a888" } }, { "key": { "amount": 90000000000000, "key_offsets": [ 7568 ], "k_image": "a530a55989d1d7ac390db54a0957a9e14001fe94ce5a6bf64a34e21dfc97269d" } } ], "vout": [ { "amount": 900000000000, "target": { "key": "780645b6f7bf1bbd689003125a1efb4bbe0d1dca98d2fb95af5e12eb57d84be8" } }, { "amount": 9000000000000, "target": { "key": "24e4ac6582a0377f38da6f3f2b476148a91d89a17e6c0e2146141985a4a9b1e0" } }, { "amount": 30000000000000, "target": { "key": "2ce68dbf3625c7ad94e86d6ca00ee46e6563d6fa017a854842e55f0bad90600b" } }, { "amount": 30000000000000, "target": { "key": "12f53fed731fe4e159c958f65e335cdf25a4c008ae0318ccac8f42f7298e4ec5" } }, { "amount": 100000000000000, "target": { "key": "bd90bac5f06ac7517202e1fb5e4cea0c785647445bb5918ec86735c4fd809e41" } } ], "extra": [ 2, 33, 0, 23, 183, 232, 10, 90, 160, 235, 57, 92, 232, 138, 29, 58, 241, 4, 161, 182, 153, 233, 67, 62, 66, 167, 192, 58, 140, 90, 152, 73, 165, 212, 121, 1, 105, 162, 236, 244, 11, 38, 180, 245, 236, 79, 226, 167, 173, 251, 208, 3, 192, 226, 171, 17, 66, 124, 153, 51, 46, 114, 240, 22, 13, 238, 124, 172 ], "signatures": [ "d17d7514ff4dd5e019fb6cf2fe64b0ef46f0b2ccd98e1c4e6711f267c8ca610b976bf5cd910f035eeb806841719436373e218404e52d130cea58cc680e5cd30c", "c2a1cbd77648e72cb68eb0f0783afc29d69ce90e266d50dcca6ed51654185b07eca5dfe60a717413a31ef05e7376b79dbde8e9715062266b022f97fddb37720c"] }


Less details
source code | moneroexplorer