Monero Transaction ff30bbdd7b69aa20c65e76ebb476b1d07cd12d372c813644f35146e3d57f70aa

Autorefresh is OFF

Tx hash: ff30bbdd7b69aa20c65e76ebb476b1d07cd12d372c813644f35146e3d57f70aa

Tx prefix hash: a1b3a20406a740516c4920cd077ed560a988a9a943fa7ed5b7f98b8e88ba6c92
Tx public key: b45ecfacf182f5b665c37b86b69264b415f9f94f43a22f3a55e9ab603e849bf2
Payment id: 0c53a111305d4b5cf910cb35ee5e8382287a73680e1e393bc9e4dd751a85afdb

Transaction ff30bbdd7b69aa20c65e76ebb476b1d07cd12d372c813644f35146e3d57f70aa was carried out on the Monero network on 2014-08-19 14:47:14. The transaction has 3131003 confirmations. Total output fee is 0.008207990000 XMR.

Timestamp: 1408459634 Timestamp [UTC]: 2014-08-19 14:47:14 Age [y:d:h:m:s]: 10:131:17:44:48
Block: 180270 Fee (per_kB): 0.008207990000 (0.013688895375) Tx size: 0.5996 kB
Tx version: 1 No of confirmations: 3131003 RingCT/type: no
Extra: 0221000c53a111305d4b5cf910cb35ee5e8382287a73680e1e393bc9e4dd751a85afdb01b45ecfacf182f5b665c37b86b69264b415f9f94f43a22f3a55e9ab603e849bf2

5 output(s) for total of 4.191792010000 xmr

stealth address amount amount idx tag
00: 193fa5d6be33cf5108bb0ab1aaf778cf57a3fc3212224086a68f49b22fa1ce94 0.001792010000 0 of 1 -
01: 6193168847e4d1adcc88c9024ade7fe52fc58b14396be243cbc375132637e3b6 0.090000000000 108708 of 317822 -
02: 7852e06fcfffd8a66e774c38b5988d9cc26b0e3a47203fb1586fa91fbd70513e 0.100000000000 452159 of 982315 -
03: de8a3a9aa07ad268417245e7b5a8a68924e4dfd2230a81e3ac60da8b2a72f360 1.000000000000 201390 of 874630 -
04: d054e9d187f8cab98d80bb799ee9d50f584a9389b0170cd9b43980a4e0e0a59c 3.000000000000 47919 of 300495 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-06 03:12:27 till 2014-08-19 15:16:09; resolution: 0.26 days)

  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |_____________________________________________________________________________________________________________________________________________________________*___________*|

2 inputs(s) for total of 4.200000000000 xmr

key image 00: be6d267a100a99a24778bb0d15990a1a1026d7549a2c5602ffb546f66ef92a41 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 36410fcbbd53dd8d31777c53251fc46a6a1071abf3acf87c547aab5aefa5d39f 00116380 1 3/56 2014-07-06 04:12:27 10:176:04:19:35
- 01: 5f2189915dac0c7c4482290d2274647341ae03b4f7fead17514a7543d0b99b37 00180242 2 3/8 2014-08-19 14:16:09 10:131:18:15:53
key image 01: 3743aa18d26747df7ec0fa5ec743fa8cb509022d36a6b5da02003bd9f7298a70 amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 306f1ee6d8a8b048a7575047045cb319b5a650ee9043bccd90b28455ae0e774c 00175703 2 2/7 2014-08-16 09:54:23 10:134:22:37:39
- 01: d59fc10f30640dd5a6419ef29b44814e28339e04bb92a7d9f953cee4f9eb6f89 00179999 0 0/5 2014-08-19 10:25:47 10:131:22:06:15
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 200000000000, "key_offsets": [ 147433, 237242 ], "k_image": "be6d267a100a99a24778bb0d15990a1a1026d7549a2c5602ffb546f66ef92a41" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 42930, 5216 ], "k_image": "3743aa18d26747df7ec0fa5ec743fa8cb509022d36a6b5da02003bd9f7298a70" } } ], "vout": [ { "amount": 1792010000, "target": { "key": "193fa5d6be33cf5108bb0ab1aaf778cf57a3fc3212224086a68f49b22fa1ce94" } }, { "amount": 90000000000, "target": { "key": "6193168847e4d1adcc88c9024ade7fe52fc58b14396be243cbc375132637e3b6" } }, { "amount": 100000000000, "target": { "key": "7852e06fcfffd8a66e774c38b5988d9cc26b0e3a47203fb1586fa91fbd70513e" } }, { "amount": 1000000000000, "target": { "key": "de8a3a9aa07ad268417245e7b5a8a68924e4dfd2230a81e3ac60da8b2a72f360" } }, { "amount": 3000000000000, "target": { "key": "d054e9d187f8cab98d80bb799ee9d50f584a9389b0170cd9b43980a4e0e0a59c" } } ], "extra": [ 2, 33, 0, 12, 83, 161, 17, 48, 93, 75, 92, 249, 16, 203, 53, 238, 94, 131, 130, 40, 122, 115, 104, 14, 30, 57, 59, 201, 228, 221, 117, 26, 133, 175, 219, 1, 180, 94, 207, 172, 241, 130, 245, 182, 101, 195, 123, 134, 182, 146, 100, 180, 21, 249, 249, 79, 67, 162, 47, 58, 85, 233, 171, 96, 62, 132, 155, 242 ], "signatures": [ "1f9f32384337d981c23d721caa4078679bdefa1e562da8014798f36dc789a905882a3383522de3e7ed96c1d6bccc496453a579d1498d21b1ef6c05e0f42d110d576744e6761b1745aeadd252f0b1de32036e7bfeb797d5da8cad94d6c322ad0dcb721ab305fe9d272cc9888d07e82893f04ac07a29b22ae3c9e38f3ec912520a", "f4e7fcf42703aaca63ad8fb064ca15492f4b0a1684712fa99a39e745a7475d08ac7d483231b2765467845446f9c8fcbf8dad787faa37dceaa33612daee1a1a02b3df2d003657808aeac1677c44034e388aedc24763eb15085604cc44f6f73c0e85d9278cd1373a1aeb77c9a134a9a343953984e1da3858c6882c5d429fa3a30c"] }


Less details
source code | moneroexplorer