Monero Transaction 29b24fbf11854fd855b8fe4169741571e95f40ea2cd8afd517a03635f60e2785

Autorefresh is OFF

Tx hash: 29b24fbf11854fd855b8fe4169741571e95f40ea2cd8afd517a03635f60e2785

Tx prefix hash: 483b452f51c260d2e3682122cc1e438267b9fd0330136e54be57155fa92959b6
Tx public key: 61d186b98f90dbad5d65918e6333cd8cd4039a85fff539360ab4eb472a4a0168
Payment id: a421a3cabaa2a4700d97220822a9d7dcfc9efe5720ac12187403f1e2bf5ecc21

Transaction 29b24fbf11854fd855b8fe4169741571e95f40ea2cd8afd517a03635f60e2785 was carried out on the Monero network on 2014-07-29 05:40:45. The transaction has 3128455 confirmations. Total output fee is 0.005912980000 XMR.

Timestamp: 1406612445 Timestamp [UTC]: 2014-07-29 05:40:45 Age [y:d:h:m:s]: 10:106:22:26:45
Block: 149614 Fee (per_kB): 0.005912980000 (0.006427698004) Tx size: 0.9199 kB
Tx version: 1 No of confirmations: 3128455 RingCT/type: no
Extra: 022100a421a3cabaa2a4700d97220822a9d7dcfc9efe5720ac12187403f1e2bf5ecc210161d186b98f90dbad5d65918e6333cd8cd4039a85fff539360ab4eb472a4a0168

9 output(s) for total of 7.164087020000 xmr

stealth address amount amount idx tag
00: fc581b15a5666261626195c555c0d9010cfe99170fc94b72bc4270ed1dc2ae6e 0.000087020000 0 of 1 -
01: 21b0449f882b7e1b1ea249c8f46a242821ed5c10007fdd28bb14474f12c0d254 0.005000000000 197404 of 308584 -
02: f93fd06cb85cd1f4b783728ea402c186455a5141df3ae20785a016531ddcc688 0.009000000000 154115 of 233398 -
03: a7198af44379459b750cd0d298a083bb5c631f3a8113c3ab6d61767fc9f54395 0.070000000000 88508 of 263947 -
04: 512f99480bfdd28281225fafee38bdecf764b7e2c16afb8ad1a731f4a1a4f629 0.080000000000 83781 of 269576 -
05: 95c1cbf2496cf39bebf01290a8ae2f69ecdfea3550b9a289b005b6d8b1b14c76 0.400000000000 120425 of 688584 -
06: 003a1d4b8124cd134af3ed0a6db346ac7f2ae017d20624f49e05788be97d3c3e 0.600000000000 115914 of 650760 -
07: 2544d836a57019e520e487e7585d04e6816a5582c6bcee01720deb3e88fe86be 2.000000000000 57617 of 434057 -
08: 20b3d9f8dcefc85ebf54933139e27749efa32e402b4e7886193730eda73fa053 4.000000000000 29414 of 237197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-04-26 19:22:06 till 2014-07-29 06:08:20; resolution: 0.55 days)

  • |____________________________________________________________________________________*____________________________________________________________________________________*|
  • |_________________________________________________________________________________*_______________________________________________________________________________________*|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|

3 inputs(s) for total of 7.170000000000 xmr

key image 00: 900f20793475ff0bc8aa5dbd08da77f75a34339b9de8288697dbdd4d3d86ccf3 amount: 0.080000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0900b3fee90593e757e89621d5949a4336f304f15895dca1d36180c97934473d 00081090 1 8/132 2014-06-11 22:46:47 10:154:05:20:43
- 01: a31b02610a12393e1e185a4828c37a95ea951fe6d1cae4ac680f43538ed26e6c 00149458 0 0/6 2014-07-29 03:19:50 10:107:00:47:40
key image 01: 91ae9780885292b4fac548a166b945626e8432a7217192a89d92f887f256bed8 amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 05d938e39dc9db44be783501dc6ca82f1b4ff6776f579e8a2110b42c35aa7f2e 00078526 1 3/77 2014-06-10 03:38:58 10:156:00:28:32
- 01: 26f45163aa20b482d1f7c85c04c6c8e03d0d8b3342fc6c149da9fb22cd7d3c90 00149535 2 1/9 2014-07-29 04:36:58 10:106:23:30:32
key image 02: cca9d5951f9b7b76e283336b46517483cf1130b2c20f9d0bbe2f9219ef97f840 amount: 7.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5a4829271b9380f26d815dae6331d5c26468a130ce9bc50eb3df63799dfd6627 00012678 0 0/9 2014-04-26 20:22:06 10:200:07:45:24
- 01: 94987e78c2ad2ea0f0457fc76441bd7baafd60c5dc6e9c6cbce96c2ee716b9d6 00149573 2 1/7 2014-07-29 05:08:20 10:106:22:59:10
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 80000000000, "key_offsets": [ 37506, 46163 ], "k_image": "900f20793475ff0bc8aa5dbd08da77f75a34339b9de8288697dbdd4d3d86ccf3" } }, { "key": { "amount": 90000000000, "key_offsets": [ 31467, 60788 ], "k_image": "91ae9780885292b4fac548a166b945626e8432a7217192a89d92f887f256bed8" } }, { "key": { "amount": 7000000000000, "key_offsets": [ 12678, 34505 ], "k_image": "cca9d5951f9b7b76e283336b46517483cf1130b2c20f9d0bbe2f9219ef97f840" } } ], "vout": [ { "amount": 87020000, "target": { "key": "fc581b15a5666261626195c555c0d9010cfe99170fc94b72bc4270ed1dc2ae6e" } }, { "amount": 5000000000, "target": { "key": "21b0449f882b7e1b1ea249c8f46a242821ed5c10007fdd28bb14474f12c0d254" } }, { "amount": 9000000000, "target": { "key": "f93fd06cb85cd1f4b783728ea402c186455a5141df3ae20785a016531ddcc688" } }, { "amount": 70000000000, "target": { "key": "a7198af44379459b750cd0d298a083bb5c631f3a8113c3ab6d61767fc9f54395" } }, { "amount": 80000000000, "target": { "key": "512f99480bfdd28281225fafee38bdecf764b7e2c16afb8ad1a731f4a1a4f629" } }, { "amount": 400000000000, "target": { "key": "95c1cbf2496cf39bebf01290a8ae2f69ecdfea3550b9a289b005b6d8b1b14c76" } }, { "amount": 600000000000, "target": { "key": "003a1d4b8124cd134af3ed0a6db346ac7f2ae017d20624f49e05788be97d3c3e" } }, { "amount": 2000000000000, "target": { "key": "2544d836a57019e520e487e7585d04e6816a5582c6bcee01720deb3e88fe86be" } }, { "amount": 4000000000000, "target": { "key": "20b3d9f8dcefc85ebf54933139e27749efa32e402b4e7886193730eda73fa053" } } ], "extra": [ 2, 33, 0, 164, 33, 163, 202, 186, 162, 164, 112, 13, 151, 34, 8, 34, 169, 215, 220, 252, 158, 254, 87, 32, 172, 18, 24, 116, 3, 241, 226, 191, 94, 204, 33, 1, 97, 209, 134, 185, 143, 144, 219, 173, 93, 101, 145, 142, 99, 51, 205, 140, 212, 3, 154, 133, 255, 245, 57, 54, 10, 180, 235, 71, 42, 74, 1, 104 ], "signatures": [ "e1f8acd1b0fd2f6a306f9de88e964b4d82685715147a7ee0a7fb2461a3b67f0abc2e371bc60087b0c5c69005655eef31efe86a9f517be2d84801ee8bb7188f097354c2820b96645ba520a0f6d2c046009bfadac35e32ea6bb4337f77086af10fb3038efd946f68d97dcdadce0e99a06222a1f3f8b9b61a35d58f592c3ae0430a", "1139b7d096f1be870617270da4637035a83ddf8d16ed3ea38ed7efe3c066b40d7f637e3066576d0718316ba7ec1aff808aca9d31fa4c0003362c96507c210203aa32665688784fcdfb9d5311ef350285e7558e1718fdd5d4eb33e62cf2f19c07e1150a6ab080b4dc82cba83b43c1c43cca7e8ec734bc12e9ff49e9434ad61609", "05f5e2624d5a285e949b1e3ed929603764d2d92da6087e27729633d3b71a480b10b2104db436369c0cc284edb36115f50c758d1b1945304491cebf607e87550a0a4b79680577560c3f937411571e3b474aa531da826a4707a719053c56d42d028da8975c6248772dee12dbfe08e6ad1187ffe74b03ea8a47f68b67bcef675b01"] }


Less details
source code | moneroexplorer