Monero Transaction 3129b2a29e8f144cfef29110645a711870c7f070aa32d9aaed742cfce33c0139

Autorefresh is OFF

Tx hash: 3129b2a29e8f144cfef29110645a711870c7f070aa32d9aaed742cfce33c0139

Tx prefix hash: 6a34950c21b6c62451b9324b01625021f28970d0bf0bc60e062a95e628db7636
Tx public key: 6105af3248ffdbc4b79083f5a3fdc8702aaba8d59f39d23249e26950ca0f6c29

Transaction 3129b2a29e8f144cfef29110645a711870c7f070aa32d9aaed742cfce33c0139 was carried out on the Monero network on 2014-06-29 18:35:30. The transaction has 3171189 confirmations. Total output fee is 0.008941816503 XMR.

Timestamp: 1404066930 Timestamp [UTC]: 2014-06-29 18:35:30 Age [y:d:h:m:s]: 10:136:17:31:46
Block: 107125 Fee (per_kB): 0.008941816503 (0.024159419786) Tx size: 0.3701 kB
Tx version: 1 No of confirmations: 3171189 RingCT/type: no
Extra: 016105af3248ffdbc4b79083f5a3fdc8702aaba8d59f39d23249e26950ca0f6c29

6 output(s) for total of 49.991058183497 xmr

stealth address amount amount idx tag
00: b1fe993c0f1bdabe405fca0c84e0daf1e731bbc6b998c6e9c5f3cbe20973afce 0.001058183497 0 of 1 -
01: 1d6d66400b07f36eedd9ba530630667c1a7144de1917b735edc7811f61f801b8 0.030000000000 143928 of 324336 -
02: 99ede0edcaed47b0b36c0033c37c018b15de96f9239e62d73256d392f6d12780 0.060000000000 87475 of 264760 -
03: 41f78e2e6876ebb62e907f1b2884609a782aaf1a69d77df05512a3ed26894e41 0.900000000000 37567 of 454894 -
04: d361ba36df8330b0df689c9ba6b6970531f91a5f6aca504b37f73dda36ce24f5 9.000000000000 8492 of 274259 -
05: 9288105d8b97b636dfae4c6e93dfbd7dcca28f97d180427fe15a6a157ee361a4 40.000000000000 1529 of 41682 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-29 16:16:13 till 2014-06-29 18:16:13; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|

1 inputs(s) for total of 50.000000000000 xmr

key image 00: b9b421c48f06066ee4ea5ac28d4563f2e0cd389fd118bbdd1343f21aedc13e64 amount: 50.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e75ff1895e19cc54f8034a77d9f74c49eab994b2e22cb15c00ee3e76fc57b256 00107046 1 1/5 2014-06-29 17:16:13 10:136:18:51:03
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 50000000000000, "key_offsets": [ 2035 ], "k_image": "b9b421c48f06066ee4ea5ac28d4563f2e0cd389fd118bbdd1343f21aedc13e64" } } ], "vout": [ { "amount": 1058183497, "target": { "key": "b1fe993c0f1bdabe405fca0c84e0daf1e731bbc6b998c6e9c5f3cbe20973afce" } }, { "amount": 30000000000, "target": { "key": "1d6d66400b07f36eedd9ba530630667c1a7144de1917b735edc7811f61f801b8" } }, { "amount": 60000000000, "target": { "key": "99ede0edcaed47b0b36c0033c37c018b15de96f9239e62d73256d392f6d12780" } }, { "amount": 900000000000, "target": { "key": "41f78e2e6876ebb62e907f1b2884609a782aaf1a69d77df05512a3ed26894e41" } }, { "amount": 9000000000000, "target": { "key": "d361ba36df8330b0df689c9ba6b6970531f91a5f6aca504b37f73dda36ce24f5" } }, { "amount": 40000000000000, "target": { "key": "9288105d8b97b636dfae4c6e93dfbd7dcca28f97d180427fe15a6a157ee361a4" } } ], "extra": [ 1, 97, 5, 175, 50, 72, 255, 219, 196, 183, 144, 131, 245, 163, 253, 200, 112, 42, 171, 168, 213, 159, 57, 210, 50, 73, 226, 105, 80, 202, 15, 108, 41 ], "signatures": [ "0e1aa04b1cdfd4caec520592f8524862bdf43126d10698b334d2199d58d5c40abd726b92fcb6f1e126b9524ba4ae1b141fd09424a8097ebc0cde27be07c74500"] }


Less details
source code | moneroexplorer