Monero Transaction 29ca55f2cb47363816926c6c4b279259f38d74ceb12e28326c56fc050a64f872

Autorefresh is OFF

Tx hash: 29ca55f2cb47363816926c6c4b279259f38d74ceb12e28326c56fc050a64f872

Tx prefix hash: 37f15eece452258bb7d5b1d1fa74c5063d93d9c7527096904570bc5aa249b048
Tx public key: 0ef2d84883299b23dfe3235f2dc16f2318a1835ea737079c35de85af7ed86d7f

Transaction 29ca55f2cb47363816926c6c4b279259f38d74ceb12e28326c56fc050a64f872 was carried out on the Monero network on 2017-01-27 16:54:11. The transaction has 2072474 confirmations. Total output fee is 0.001999999999 XMR.

Timestamp: 1485536051 Timestamp [UTC]: 2017-01-27 16:54:11 Age [y:d:h:m:s]: 07:326:15:53:06
Block: 1233048 Fee (per_kB): 0.001999999999 (0.005278350513) Tx size: 0.3789 kB
Tx version: 1 No of confirmations: 2072474 RingCT/type: no
Extra: 010ef2d84883299b23dfe3235f2dc16f2318a1835ea737079c35de85af7ed86d7f

3 output(s) for total of 0.028000000001 xmr

stealth address amount amount idx tag
00: f0b50bc413328767954a3f8fc31dcd8cf06f22b413a75899dd90ee093889e1a0 0.000000000001 19532 of 21631 -
01: a4ce4ba3f053a0a9e941118cb4e4a3a754e594d748366911c868c235f765c722 0.008000000000 243960 of 245068 -
02: 09dffcb5b4a3a61693137922b2cf1ca79aa279fe2050e0385b87cc2d44bb5a56 0.020000000000 380776 of 381492 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-23 01:37:51 till 2017-01-27 16:28:28; resolution: 5.41 days)

  • |_*___________________________________________________________________________________________*___________________________________________________________________________*|

1 inputs(s) for total of 0.030000000000 xmr

key image 00: 8368d7043aae106828c2f8bfa51e6b86287e23e24b775d40b6a8b16a18dc415f amount: 0.030000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4ae01d3e924f112ea15d53015461411c0e557ac872a3182b36bc4dcd48a9a728 00140725 2 1/9 2014-07-23 02:37:51 10:151:06:09:26
- 01: 474faf672c17d72c771d789108610b274271404708404492681e674c741531ec 00855920 2 17/14 2015-12-05 19:32:02 09:015:13:15:15
- 02: 7f4b7b484a150ba5f93fbf811bf65cc99e91c43fa121a3dcc0042a0303a44c81 01233003 3 1/3 2017-01-27 15:28:28 07:326:17:18:49
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 30000000000, "key_offsets": [ 151132, 85818, 86799 ], "k_image": "8368d7043aae106828c2f8bfa51e6b86287e23e24b775d40b6a8b16a18dc415f" } } ], "vout": [ { "amount": 1, "target": { "key": "f0b50bc413328767954a3f8fc31dcd8cf06f22b413a75899dd90ee093889e1a0" } }, { "amount": 8000000000, "target": { "key": "a4ce4ba3f053a0a9e941118cb4e4a3a754e594d748366911c868c235f765c722" } }, { "amount": 20000000000, "target": { "key": "09dffcb5b4a3a61693137922b2cf1ca79aa279fe2050e0385b87cc2d44bb5a56" } } ], "extra": [ 1, 14, 242, 216, 72, 131, 41, 155, 35, 223, 227, 35, 95, 45, 193, 111, 35, 24, 161, 131, 94, 167, 55, 7, 156, 53, 222, 133, 175, 126, 216, 109, 127 ], "signatures": [ "e98a866984a060bbd889f5a3afc487d10b6864ecb938c5e6519a89d342a1bd094e80bde645b0c257cc50c0d8442c5c5ac24dc03c04c8f6952c849816beca2a0221ca80d0aecabcea17a4b69fcfae7a19c36150456a2e543f849f23ce9109f30f716f434cb1593706316e5e2a1a37f316188dea1fb46f695c0ee3a6f25c676304edc8bc457613a6525878f116cd772cba7b85fe937f8a2ff2cb623eacb9253b02e7b8efd1238b2ab66c3491fbc172e17b1f04f5c6f9327456cb2925d3176ade02"] }


Less details
source code | moneroexplorer