Monero Transaction d029adac2fa6da05369d6d114e46b899267b6db23b8df6a781afc045adc5b160

Autorefresh is OFF

Tx hash: d029adac2fa6da05369d6d114e46b899267b6db23b8df6a781afc045adc5b160

Tx prefix hash: 45303b16e282b49e68d42a70989ae1444f1826a220e4d064570533f875d5b786
Tx public key: 2e44a35ba99f4950ceaf1618f811e13921328f449992d72c75d757f5b7cd5bf3
Payment id: 1a786b47284507e762c940a50c6fd7c542fd83b221684b181c1a9e2f46791c3b

Transaction d029adac2fa6da05369d6d114e46b899267b6db23b8df6a781afc045adc5b160 was carried out on the Monero network on 2014-07-24 14:03:18. The transaction has 3135662 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1406210598 Timestamp [UTC]: 2014-07-24 14:03:18 Age [y:d:h:m:s]: 10:112:05:51:25
Block: 142892 Fee (per_kB): 0.005000000000 (0.007804878049) Tx size: 0.6406 kB
Tx version: 1 No of confirmations: 3135662 RingCT/type: no
Extra: 0221001a786b47284507e762c940a50c6fd7c542fd83b221684b181c1a9e2f46791c3b012e44a35ba99f4950ceaf1618f811e13921328f449992d72c75d757f5b7cd5bf3

4 output(s) for total of 1.395000000000 xmr

stealth address amount amount idx tag
00: a48507b43d27551e6b5d69b6bfbe70c032bdec15051f9b07786f20c9d7f79e48 0.005000000000 194194 of 308584 -
01: 73326fe51d0b832c979a38e3ea95e8662dad324ff3309b714424e2703d1add70 0.090000000000 88496 of 317822 -
02: 710e63efc6b8d439f964556eb31e06668b45f7df67185ca34b479a33a6242e70 0.400000000000 111197 of 688584 -
03: f8ffd47f97b9ca24e30ddf35365be074d8795d93e1d10c3e4b3e527e8f4bbad5 0.900000000000 64243 of 454894 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-08 21:31:49 till 2014-07-24 11:02:57; resolution: 0.09 days)

  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_____________________________________________________________________________________________________________________________________________________________________*____|
  • |_______________________________________________________________________________________________________________________________________________________________________*__|
  • |_*________________________________________________________________________________________________________________________________________________________________________|

4 inputs(s) for total of 1.400000000000 xmr

key image 00: 6968c7932c37ab4c29f417292a0e78b13762b6f4aa6890fa4415a7044d727c41 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b297a7898202fd52ffccaa6dd7106e3cd307e53ca7cd372fa4678e8eb66a4605 00142644 1 4/32 2014-07-24 10:02:57 10:112:09:51:46
key image 01: a889af3a95c8dcae7ee1457d2611ddbb3254ed5a8c462050cfdba7fdf4d2c0d2 amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 021ec9ff6ec7aa93b3b8849165072593ff194c56b440c78321941fba0cc32d34 00142141 1 9/56 2014-07-24 01:36:51 10:112:18:17:52
key image 02: 874390172df1276d0be365cd7957c7971eb60feb2b51f4a7b88e96b251498b26 amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5ce0428a90ccc04a7a51ab1b23e977029cf7f326e52bb00f3970ded586a3e513 00142425 1 6/30 2014-07-24 06:32:29 10:112:13:22:14
key image 03: 565f18b88341a7de9e97040621b5ff1dbacff82f986e59de72771462ad13c448 amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ea3f89a08ecb3cc47cd54cb9036f1bb12f748f3e85a4942e39dbb2a38f164ad9 00120286 1 37/71 2014-07-08 22:31:49 10:127:21:22:54
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 200000000000, "key_offsets": [ 250474 ], "k_image": "6968c7932c37ab4c29f417292a0e78b13762b6f4aa6890fa4415a7044d727c41" } }, { "key": { "amount": 100000000000, "key_offsets": [ 313501 ], "k_image": "a889af3a95c8dcae7ee1457d2611ddbb3254ed5a8c462050cfdba7fdf4d2c0d2" } }, { "key": { "amount": 100000000000, "key_offsets": [ 314243 ], "k_image": "874390172df1276d0be365cd7957c7971eb60feb2b51f4a7b88e96b251498b26" } }, { "key": { "amount": 1000000000000, "key_offsets": [ 85480 ], "k_image": "565f18b88341a7de9e97040621b5ff1dbacff82f986e59de72771462ad13c448" } } ], "vout": [ { "amount": 5000000000, "target": { "key": "a48507b43d27551e6b5d69b6bfbe70c032bdec15051f9b07786f20c9d7f79e48" } }, { "amount": 90000000000, "target": { "key": "73326fe51d0b832c979a38e3ea95e8662dad324ff3309b714424e2703d1add70" } }, { "amount": 400000000000, "target": { "key": "710e63efc6b8d439f964556eb31e06668b45f7df67185ca34b479a33a6242e70" } }, { "amount": 900000000000, "target": { "key": "f8ffd47f97b9ca24e30ddf35365be074d8795d93e1d10c3e4b3e527e8f4bbad5" } } ], "extra": [ 2, 33, 0, 26, 120, 107, 71, 40, 69, 7, 231, 98, 201, 64, 165, 12, 111, 215, 197, 66, 253, 131, 178, 33, 104, 75, 24, 28, 26, 158, 47, 70, 121, 28, 59, 1, 46, 68, 163, 91, 169, 159, 73, 80, 206, 175, 22, 24, 248, 17, 225, 57, 33, 50, 143, 68, 153, 146, 215, 44, 117, 215, 87, 245, 183, 205, 91, 243 ], "signatures": [ "0225c92205ebf14c6c825542a75bc94c6e5dcc654b4298e830bea98d7744d30e75b16c05368b5280f7e7ad246551e8c5c4916f62ffdee91d0fb9cb1d7e42f802", "d19992d13208bc6165e4453e88d87644a9efa9a75923de550c1d8ea02b83980965db2925ae2e015dad6e792cbd5b4169b85e33846bbe7970d08533067dfb5b07", "63a44d5c72c639c07a6ae55e9c98aaba094dbf19b495e05312c08e26ecc2630640c6f696d0d96f96419ffcb6d633bad6455adaaadecf10d04b52d09f546e1f0b", "6ff851fcf09ab7106f48f141e2cc51c30cc122a0e435b2421ea2b3db7b7ed804f7c8ec5537a66382653ca4f74bb30b683061ec089f9b7ac22487bbfdbe9a390e"] }


Less details
source code | moneroexplorer