Monero Transaction b29d7c5a046aa645a0369737588bfeb91795f6a127611af050b600a97754f24f

Autorefresh is OFF

Tx hash: b29d7c5a046aa645a0369737588bfeb91795f6a127611af050b600a97754f24f

Tx prefix hash: 01b93026bb2399e45e30f948edbb8eeb4a606cbc3e0ee199b8e108a91c1ccf84
Tx public key: c4900284ed3655982f3610b58e3fa0c2393d9a8aa722807d54b5cc6ecda1b5d1
Payment id: 7fc08eb47dfb0319777fa6504b76211ff570dd57c50744838ce4835442186470

Transaction b29d7c5a046aa645a0369737588bfeb91795f6a127611af050b600a97754f24f was carried out on the Monero network on 2014-05-19 05:15:58. The transaction has 3195842 confirmations. Total output fee is 0.000001917268 XMR.

Timestamp: 1400476558 Timestamp [UTC]: 2014-05-19 05:15:58 Age [y:d:h:m:s]: 10:128:03:22:40
Block: 46391 Fee (per_kB): 0.000001917268 (0.000002491475) Tx size: 0.7695 kB
Tx version: 1 No of confirmations: 3195842 RingCT/type: no
Extra: 0221007fc08eb47dfb0319777fa6504b76211ff570dd57c50744838ce483544218647001c4900284ed3655982f3610b58e3fa0c2393d9a8aa722807d54b5cc6ecda1b5d1

5 output(s) for total of 5.404069000000 xmr

stealth address amount amount idx tag
00: 1b0726465aea2dfddbd34caa197ffebe7582a91c835b00aaca293b7940bdb5b3 0.000009000000 5345 of 46395 -
01: 1f58655cf3f1266ffa17fa8d76c4d68d2760cafd848100b8cff744568e354650 0.000060000000 4946 of 59217 -
02: 9b26e25f0a142f10de0123d2ff95d6ae150ad6d947c3ab5d75eea0601f84945d 0.004000000000 4982 of 89181 -
03: 4cf23fe1a2ecff8a545866a6cf640e78a3092ec820d621ca21e826d23e219cbf 0.400000000000 6393 of 688584 -
04: 28d1ab4d181bc178f9c082220e17a77a4eb4f57fd493fa6a92b36e78714421f7 5.000000000000 547 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-13 10:19:36 till 2014-05-13 12:19:36; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|

5 inputs(s) for total of 5.404070917268 xmr

key image 00: d81ce5ba09f97e49f9eed617e53f3e3a93b981ad2314bce239a686d0b292db98 amount: 0.000000917268
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4c3f5e1309256b24236c27eb8d0d78eb2c19ac369dfae68674548591bd1c6811 00037714 0 0/7 2014-05-13 11:19:36 10:133:21:19:02
key image 01: 70823e9a41f45afdff2602cc9f0919f9c3fcc9fd059aab4329e718be7237bc34 amount: 0.400000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 824aa1330d5ad5e61a3e495b31dd119fe81c119c48a54309103214505405552b 00037714 0 0/7 2014-05-13 11:19:36 10:133:21:19:02
key image 02: 194118e245705fef8de1fb77f78496e6fcd0b019b6c8e46cf94b24ee695cdfb0 amount: 0.000070000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 764e770167368496ad4a32d23236063d11e67764489d749342844ec620fa6537 00037714 0 0/7 2014-05-13 11:19:36 10:133:21:19:02
key image 03: 75c032268d9e95a1576fa83462a95e6e4dcd8d03e2ab6f2ce1b658b5d08b2a1e amount: 0.004000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a8687fcc6f74d7a19353a3504c26bf6de17c76cfe554f78bdc649ad465dfe5c9 00037714 0 0/7 2014-05-13 11:19:36 10:133:21:19:02
key image 04: 114c3c4b299110566347985620f7034fcdf8527cd3d40020f4fb4b7c9045cd82 amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3fe8c25688bd3a0f4cf71b083128138b92da40eeafcbde5741f483598dd1f7e5 00037714 0 0/7 2014-05-13 11:19:36 10:133:21:19:02
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 917268, "key_offsets": [ 0 ], "k_image": "d81ce5ba09f97e49f9eed617e53f3e3a93b981ad2314bce239a686d0b292db98" } }, { "key": { "amount": 400000000000, "key_offsets": [ 6251 ], "k_image": "70823e9a41f45afdff2602cc9f0919f9c3fcc9fd059aab4329e718be7237bc34" } }, { "key": { "amount": 70000000, "key_offsets": [ 3995 ], "k_image": "194118e245705fef8de1fb77f78496e6fcd0b019b6c8e46cf94b24ee695cdfb0" } }, { "key": { "amount": 4000000000, "key_offsets": [ 3919 ], "k_image": "75c032268d9e95a1576fa83462a95e6e4dcd8d03e2ab6f2ce1b658b5d08b2a1e" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 395 ], "k_image": "114c3c4b299110566347985620f7034fcdf8527cd3d40020f4fb4b7c9045cd82" } } ], "vout": [ { "amount": 9000000, "target": { "key": "1b0726465aea2dfddbd34caa197ffebe7582a91c835b00aaca293b7940bdb5b3" } }, { "amount": 60000000, "target": { "key": "1f58655cf3f1266ffa17fa8d76c4d68d2760cafd848100b8cff744568e354650" } }, { "amount": 4000000000, "target": { "key": "9b26e25f0a142f10de0123d2ff95d6ae150ad6d947c3ab5d75eea0601f84945d" } }, { "amount": 400000000000, "target": { "key": "4cf23fe1a2ecff8a545866a6cf640e78a3092ec820d621ca21e826d23e219cbf" } }, { "amount": 5000000000000, "target": { "key": "28d1ab4d181bc178f9c082220e17a77a4eb4f57fd493fa6a92b36e78714421f7" } } ], "extra": [ 2, 33, 0, 127, 192, 142, 180, 125, 251, 3, 25, 119, 127, 166, 80, 75, 118, 33, 31, 245, 112, 221, 87, 197, 7, 68, 131, 140, 228, 131, 84, 66, 24, 100, 112, 1, 196, 144, 2, 132, 237, 54, 85, 152, 47, 54, 16, 181, 142, 63, 160, 194, 57, 61, 154, 138, 167, 34, 128, 125, 84, 181, 204, 110, 205, 161, 181, 209 ], "signatures": [ "55ac7d13c77b8b2d09fad78f2bc170974d6c617e54e10880bc93103e5c423c07db57b05721cd27d2a9651d7253e52f7e5c84f6532376ee42c9a8beaacc7fb406", "1b9f4bcd8abdfa7da0f86ca1d0dd349fda5833001aa4db44076369fae0744d0f306c2e97f0dd516f3ce7c71998bfe5afa9e68dbade9b07614fad6ce937cb3506", "1d6c66d244a200c1d99695c3579057705684c9de6ba8a16e9df1bc9084c60401532cba1ca603b89fad78afe269cf3b87b47faa796ab7db148541888483077807", "e6b91b4f0f47a67ce651b94d98216ed37e89d46eb4da041f1c211e8b3fa8f10940decf21698540c54c4c7941e9b26b498d5b8c1444b2b4d0d12fbfffb4f70407", "03f873c53eaeb269f7b3da1a70aed122109539be647e92ae24c23200da5df90fa5ad194ff828c35269cad17fc306f53ac907c38c451a0cf829c8cd9ce3657c05"] }


Less details
source code | moneroexplorer