Monero Transaction fa2da25b50973d61c31000b9eb3afed5196316912159fd849d7f30279d2d299f

Autorefresh is OFF

Tx hash: fa2da25b50973d61c31000b9eb3afed5196316912159fd849d7f30279d2d299f

Tx prefix hash: 72d64974d112732bf9ef5f133e496e16e1df689ab1a836621b015f9cee36e805
Tx public key: 429c5ae02da37866dbfb0f72cb324eb6b76431afd936b0cfc0b158fc32d695ae
Payment id: 1640ad94e7fa526b94e3440029bbd11cc6ca99d5f80eede3c722b7b6b16cf8f0

Transaction fa2da25b50973d61c31000b9eb3afed5196316912159fd849d7f30279d2d299f was carried out on the Monero network on 2014-05-29 10:57:39. The transaction has 3228124 confirmations. Total output fee is 0.005000046829 XMR.

Timestamp: 1401361059 Timestamp [UTC]: 2014-05-29 10:57:39 Age [y:d:h:m:s]: 10:184:00:18:37
Block: 61658 Fee (per_kB): 0.005000046829 (0.010711397391) Tx size: 0.4668 kB
Tx version: 1 No of confirmations: 3228124 RingCT/type: no
Extra: 0221001640ad94e7fa526b94e3440029bbd11cc6ca99d5f80eede3c722b7b6b16cf8f001429c5ae02da37866dbfb0f72cb324eb6b76431afd936b0cfc0b158fc32d695ae

5 output(s) for total of 6.995000000000 xmr

stealth address amount amount idx tag
00: b3501bb278f36a3602580b2d5a3960a7040ec819a4a22753aaa59fd317063734 0.005000000000 29433 of 308585 -
01: af5ebee56cea1aa72bef9b25cff2da870d1385ecb99fda8afdd71f81a368761f 0.090000000000 12543 of 317822 -
02: 4f7d242fc2b939f2ad5954be567dc981f862bcc028839cabee20c866e524fec9 0.900000000000 9138 of 454894 -
03: 3ce085495ff216cef4256df5f0c2e16bea35db0b7d8a60896ee4c8ebe1868b77 1.000000000000 6030 of 874629 -
04: 696595d65d06f8e0ab947798f3a4cff3f8bbb17c0d0148aa4a2d24a91a0d23ec 5.000000000000 2430 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-20 20:02:06 till 2014-05-27 22:44:12; resolution: 0.04 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 7.000000046829 xmr

key image 00: 29dc9418fd413f26f9e35d3ad94810e5ff4faccc789e0fd6a5d2564e85e06425 amount: 0.000000046829
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 226695cfdd9fbb406713fab37e2a8dbdbd50b164665be16825b64728ab591a0a 00049095 1 15/1001 2014-05-20 21:02:06 10:192:14:14:10
key image 01: 4064e075779076f59edecb6ddd7398f9ff47981520ebe736dafd18f34a9cc590 amount: 7.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8764c1da78bbeee9e785d6446780551c30281a96b59cbebc9216d3f37d42816c 00059403 1 27/5 2014-05-27 21:44:12 10:185:13:32:04
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 46829, "key_offsets": [ 0 ], "k_image": "29dc9418fd413f26f9e35d3ad94810e5ff4faccc789e0fd6a5d2564e85e06425" } }, { "key": { "amount": 7000000000000, "key_offsets": [ 36219 ], "k_image": "4064e075779076f59edecb6ddd7398f9ff47981520ebe736dafd18f34a9cc590" } } ], "vout": [ { "amount": 5000000000, "target": { "key": "b3501bb278f36a3602580b2d5a3960a7040ec819a4a22753aaa59fd317063734" } }, { "amount": 90000000000, "target": { "key": "af5ebee56cea1aa72bef9b25cff2da870d1385ecb99fda8afdd71f81a368761f" } }, { "amount": 900000000000, "target": { "key": "4f7d242fc2b939f2ad5954be567dc981f862bcc028839cabee20c866e524fec9" } }, { "amount": 1000000000000, "target": { "key": "3ce085495ff216cef4256df5f0c2e16bea35db0b7d8a60896ee4c8ebe1868b77" } }, { "amount": 5000000000000, "target": { "key": "696595d65d06f8e0ab947798f3a4cff3f8bbb17c0d0148aa4a2d24a91a0d23ec" } } ], "extra": [ 2, 33, 0, 22, 64, 173, 148, 231, 250, 82, 107, 148, 227, 68, 0, 41, 187, 209, 28, 198, 202, 153, 213, 248, 14, 237, 227, 199, 34, 183, 182, 177, 108, 248, 240, 1, 66, 156, 90, 224, 45, 163, 120, 102, 219, 251, 15, 114, 203, 50, 78, 182, 183, 100, 49, 175, 217, 54, 176, 207, 192, 177, 88, 252, 50, 214, 149, 174 ], "signatures": [ "62be552f0703d64691795ae344ed2cb9e74bfe29f877b0612a342bd072584f0ffb54940ec3d5bbda070dfa51bf87009e581030d343cddb4bf6a2fe19a866ec08", "e017a394b927f57ffdcedf79efefadcaf430bb3fecceb4159c49ccc6eac80609aa9398341a7d5dc26ac9f5d4b7358f9fdcd9b46567e27aba150a9be1612ab303"] }


Less details
source code | moneroexplorer