Monero Transaction 29320b295933adb3007a6c3130e3da6cb256527aa0aca081d1d1d300714f5d4b

Autorefresh is OFF

Tx hash: 29320b295933adb3007a6c3130e3da6cb256527aa0aca081d1d1d300714f5d4b

Tx prefix hash: 31aa5058f7e795698d90c55345451b3818e318290bccfc061e5c8261e9ff98bb
Tx public key: b71bd0bd3c7b90fab881621b290c53902a5077cafc660ee16541096f14bd4e89
Payment id: 9840d3a765cd3d6b726c1eb9df34d74a8c78b04166c520d3ff45a5317a80b35b

Transaction 29320b295933adb3007a6c3130e3da6cb256527aa0aca081d1d1d300714f5d4b was carried out on the Monero network on 2014-08-08 13:40:49. The transaction has 3144825 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1407505249 Timestamp [UTC]: 2014-08-08 13:40:49 Age [y:d:h:m:s]: 10:140:01:57:24
Block: 164525 Fee (per_kB): 0.010000000000 (0.028209366391) Tx size: 0.3545 kB
Tx version: 1 No of confirmations: 3144825 RingCT/type: no
Extra: 0221009840d3a765cd3d6b726c1eb9df34d74a8c78b04166c520d3ff45a5317a80b35b01b71bd0bd3c7b90fab881621b290c53902a5077cafc660ee16541096f14bd4e89

2 output(s) for total of 0.620000000000 xmr

stealth address amount amount idx tag
00: 285a9adf717a9ff4852a3dbbe08efd0c454f4d359cf0ffca399f87d926a8021b 0.020000000000 211815 of 381492 -
01: b52a3525e765988e4bf65c285789488570bc155c8c4794ca5a2a524264f238cc 0.600000000000 137562 of 650760 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-08-08 08:05:35 till 2014-08-08 13:44:58; resolution: 0.00 days)

  • |____________________________________________________________________________________________________________________________________________*_____________________________|
  • |______________________________*___________________________________________________________________________________________________________________________________________|

2 inputs(s) for total of 0.630000000000 xmr

key image 00: ed7033c2d4dae14684ccecbe4294489aa70c9f0f633d80fbc0a711a3accf0027 amount: 0.600000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8de969df6e8b93ae7ad82737f4e08d18723f5b877cd86cb787a3577f7775cdda 00164449 5 9/18 2014-08-08 12:44:58 10:140:02:53:15
key image 01: dd9efe9a075e9df2665cf01b7b1bd65e568119cfb05b25d8667cdd817fc5ca69 amount: 0.030000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 04054d8b9d1fd3f5b2970ccd8430b50f51aa2c7f5e13f82866ecd09ce5a0ad62 00164171 1 2/2 2014-08-08 09:05:35 10:140:06:32:38
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 600000000000, "key_offsets": [ 137459 ], "k_image": "ed7033c2d4dae14684ccecbe4294489aa70c9f0f633d80fbc0a711a3accf0027" } }, { "key": { "amount": 30000000000, "key_offsets": [ 159401 ], "k_image": "dd9efe9a075e9df2665cf01b7b1bd65e568119cfb05b25d8667cdd817fc5ca69" } } ], "vout": [ { "amount": 20000000000, "target": { "key": "285a9adf717a9ff4852a3dbbe08efd0c454f4d359cf0ffca399f87d926a8021b" } }, { "amount": 600000000000, "target": { "key": "b52a3525e765988e4bf65c285789488570bc155c8c4794ca5a2a524264f238cc" } } ], "extra": [ 2, 33, 0, 152, 64, 211, 167, 101, 205, 61, 107, 114, 108, 30, 185, 223, 52, 215, 74, 140, 120, 176, 65, 102, 197, 32, 211, 255, 69, 165, 49, 122, 128, 179, 91, 1, 183, 27, 208, 189, 60, 123, 144, 250, 184, 129, 98, 27, 41, 12, 83, 144, 42, 80, 119, 202, 252, 102, 14, 225, 101, 65, 9, 111, 20, 189, 78, 137 ], "signatures": [ "a107fbf6bd73976ff28b6747b432a2b10041f0137dae1d104bf20f9d0e72ee087e53a6c32244a8c190310358f6e03c14ff003d000c6adce224fcef4e0c2e7801", "18be33c65592b7f459da1ed80a7e9a5f7fc9d37b34b2bff7c0a0f80f6499a201874c30f68afd7d45f693573a5d4109f95cc7e2f691e74db4a789acfafe9cd30b"] }


Less details
source code | moneroexplorer