Monero Transaction e29398baa288a1a1d20c8a09717ebfdc3d1d80be98f342e45bb7592d310fee4a

Autorefresh is OFF

Tx hash: e29398baa288a1a1d20c8a09717ebfdc3d1d80be98f342e45bb7592d310fee4a

Tx prefix hash: fdf849d9915ea18a8eabac765cd4da2d27a28305ccf16710ca70a21eb2d79f21
Tx public key: 5b631453e1d040aa4f233b7cb00f9f5d322c554da36d86ae7b5a1bd73dca9bdb
Payment id: 90dbbaf2fa306fdc224f0dfe1aec90e397766289cbf3e9504d9ee250360ccf5e

Transaction e29398baa288a1a1d20c8a09717ebfdc3d1d80be98f342e45bb7592d310fee4a was carried out on the Monero network on 2014-07-28 14:40:20. The transaction has 3132258 confirmations. Total output fee is 0.005208460000 XMR.

Timestamp: 1406558420 Timestamp [UTC]: 2014-07-28 14:40:20 Age [y:d:h:m:s]: 10:111:15:12:20
Block: 148713 Fee (per_kB): 0.005208460000 (0.007718470391) Tx size: 0.6748 kB
Tx version: 1 No of confirmations: 3132258 RingCT/type: no
Extra: 02210090dbbaf2fa306fdc224f0dfe1aec90e397766289cbf3e9504d9ee250360ccf5e015b631453e1d040aa4f233b7cb00f9f5d322c554da36d86ae7b5a1bd73dca9bdb

7 output(s) for total of 2.994791540000 xmr

stealth address amount amount idx tag
00: 3e3c1aa472aca81caa2954b4607f5cfa1d88af4ed4cf30262fa77ce64cf3bbae 0.004791540000 0 of 1 -
01: 9e35c0ffee812b7039ac62223919483d3f80252ec679bdf0cf5bd3b4a02c7692 0.040000000000 126007 of 294095 -
02: f02541b066ca7fbf25f66f7f8fba7eeb33109cbf1a73a8996deed5c41fd2d7c7 0.050000000000 110519 of 284521 -
03: d980963f7d9271f5ed72529d8fe42b1c364142fc24e81c976b2c33de202ad3e2 0.200000000000 273456 of 1272210 -
04: 139c6871f0696ba36aea6d2341ed5e208b95c4a00bf1bdbe279321f3cd381e74 0.700000000000 85097 of 514467 -
05: 05b12912a687af6565afa5052d7d464bf7f092839d3d9d0c8b906396927dd39b 1.000000000000 143392 of 874629 -
06: 8ee0a6809069b4c61a4e416338059b5c663542fb6f06cafa347fb624b5cf4c22 1.000000000000 143393 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-29 05:22:19 till 2014-07-28 15:19:48; resolution: 0.36 days)

  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |____________________________________________________________*____________________________________________________________________________________________________________*|

2 inputs(s) for total of 3.000000000000 xmr

key image 00: ff70cd2b1fb12264da848e160cb59a86be04a54ce1687a9556efa0465a47256c amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8605e55f9bd683a0347f0a9fc9ded9c608d1e6a8ee4452b7d8c82b57cc05ce35 00061483 1 7/96 2014-05-29 06:22:19 10:171:23:30:21
- 01: 73dbcb81a3358bfd4b102bd50dce253bfe9ce15676fecc2f11c2f5ff98e08f8b 00148593 2 1/7 2014-07-28 12:50:06 10:111:17:02:34
key image 01: d40ecef76c31effc05ea4a587857af182117fc732c572cb7940a64ace5acb960 amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9f690654d633cc356d732456ab8096c372e37fe37795eaa5500a97ca577b9e01 00092182 1 4/3 2014-06-19 12:08:50 10:150:17:43:50
- 01: c0b4b4ea4c1cabc83ce627dbcaf3198c52e5380266559514d4b4c150587e1a8b 00148695 2 10/78 2014-07-28 14:19:48 10:111:15:32:52
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 1000000000000, "key_offsets": [ 5937, 137189 ], "k_image": "ff70cd2b1fb12264da848e160cb59a86be04a54ce1687a9556efa0465a47256c" } }, { "key": { "amount": 2000000000000, "key_offsets": [ 15944, 40824 ], "k_image": "d40ecef76c31effc05ea4a587857af182117fc732c572cb7940a64ace5acb960" } } ], "vout": [ { "amount": 4791540000, "target": { "key": "3e3c1aa472aca81caa2954b4607f5cfa1d88af4ed4cf30262fa77ce64cf3bbae" } }, { "amount": 40000000000, "target": { "key": "9e35c0ffee812b7039ac62223919483d3f80252ec679bdf0cf5bd3b4a02c7692" } }, { "amount": 50000000000, "target": { "key": "f02541b066ca7fbf25f66f7f8fba7eeb33109cbf1a73a8996deed5c41fd2d7c7" } }, { "amount": 200000000000, "target": { "key": "d980963f7d9271f5ed72529d8fe42b1c364142fc24e81c976b2c33de202ad3e2" } }, { "amount": 700000000000, "target": { "key": "139c6871f0696ba36aea6d2341ed5e208b95c4a00bf1bdbe279321f3cd381e74" } }, { "amount": 1000000000000, "target": { "key": "05b12912a687af6565afa5052d7d464bf7f092839d3d9d0c8b906396927dd39b" } }, { "amount": 1000000000000, "target": { "key": "8ee0a6809069b4c61a4e416338059b5c663542fb6f06cafa347fb624b5cf4c22" } } ], "extra": [ 2, 33, 0, 144, 219, 186, 242, 250, 48, 111, 220, 34, 79, 13, 254, 26, 236, 144, 227, 151, 118, 98, 137, 203, 243, 233, 80, 77, 158, 226, 80, 54, 12, 207, 94, 1, 91, 99, 20, 83, 225, 208, 64, 170, 79, 35, 59, 124, 176, 15, 159, 93, 50, 44, 85, 77, 163, 109, 134, 174, 123, 90, 27, 215, 61, 202, 155, 219 ], "signatures": [ "bdfffe07b1c8c2fe96fe60f19f802f555d4ce508636b046e4235191b4ccff00c4b1fa8100added98202b139c16bbbd161a571d3561875d80bdaa70235fa08d05cc3c81076348f5f8a6e4ec6b1ecb17789c886739a302bc7b78d74a088837aa05bdc696047c4727eda1309eb28a50cbbcb2181fa61d2c8cf775ff37486998f806", "abba9c79036bd6c06947d7c9e0ce46e288c908b18181128b00b2684d69880703972fe9faeffb9ac32c7645ddadbb4a7ea480facf5cd80f30a23d79043bb9a10840a05d969db08ba554efdf1f547167d0842742cfd51e11b68e8941d3ccca1c0da704028430b2b0948f02d91fed496e4ec63bdcf595e8ff5b4bde6df88027760f"] }


Less details
source code | moneroexplorer