Monero Transaction fd2c29a53869335d398ed987c27f6404a949b767dba04de97b728759ccbc0300

Autorefresh is OFF

Tx hash: fd2c29a53869335d398ed987c27f6404a949b767dba04de97b728759ccbc0300

Tx prefix hash: bd34413eaf8be9507e1e472c093f5f529ba661f32b862c420457ab57907e0137
Tx public key: 3fd118ece7aacf1885a0d090a84a50d2e7fb9f4df57663bc2ad4334b5edef7ca

Transaction fd2c29a53869335d398ed987c27f6404a949b767dba04de97b728759ccbc0300 was carried out on the Monero network on 2014-12-06 21:10:23. The transaction has 2964683 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1417900223 Timestamp [UTC]: 2014-12-06 21:10:23 Age [y:d:h:m:s]: 10:008:13:31:59
Block: 336576 Fee (per_kB): 0.100000000000 (0.310303030303) Tx size: 0.3223 kB
Tx version: 1 No of confirmations: 2964683 RingCT/type: no
Extra: 013fd118ece7aacf1885a0d090a84a50d2e7fb9f4df57663bc2ad4334b5edef7ca

2 output(s) for total of 0.400000000000 xmr

stealth address amount amount idx tag
00: 1ffba2a896ad02f49e17bfeb78f35514f31a970b84d2e11ac4289c7268eebf4c 0.100000000000 662293 of 982315 -
01: 421dcb5ac96d284eff16df817c3ca7a44fdde8117af01042b93361c8cd850050 0.300000000000 365496 of 976536 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-12-03 20:56:10 till 2014-12-03 23:58:28; resolution: 0.00 days)

  • |________________________________________________________*_________________________________________________________________________________________________________________|
  • |__________________________________________________________________________________________________________________*_______________________________________________________|

2 inputs(s) for total of 0.500000000000 xmr

key image 00: 28d498831a4a43bb95912331a9c5a102ea87ad926ab9b155e9e4b019fd5fad5f amount: 0.300000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 946524ba209544de426319ff4df38370c95d515effd40d423cd78a7d1b5c72bf 00332254 1 2/51 2014-12-03 21:56:10 10:011:12:46:12
key image 01: 0f6928b9e658629c7451107d72b623970cc4787948f5b176e308212f106b28ba amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: fab67938c783b2bfbf1eb1e95cd60a3277abb4766e97f879c554c4d0ad0c37aa 00332310 1 2/51 2014-12-03 22:58:28 10:011:11:43:54
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 300000000000, "key_offsets": [ 361664 ], "k_image": "28d498831a4a43bb95912331a9c5a102ea87ad926ab9b155e9e4b019fd5fad5f" } }, { "key": { "amount": 200000000000, "key_offsets": [ 658840 ], "k_image": "0f6928b9e658629c7451107d72b623970cc4787948f5b176e308212f106b28ba" } } ], "vout": [ { "amount": 100000000000, "target": { "key": "1ffba2a896ad02f49e17bfeb78f35514f31a970b84d2e11ac4289c7268eebf4c" } }, { "amount": 300000000000, "target": { "key": "421dcb5ac96d284eff16df817c3ca7a44fdde8117af01042b93361c8cd850050" } } ], "extra": [ 1, 63, 209, 24, 236, 231, 170, 207, 24, 133, 160, 208, 144, 168, 74, 80, 210, 231, 251, 159, 77, 245, 118, 99, 188, 42, 212, 51, 75, 94, 222, 247, 202 ], "signatures": [ "bd6c32b42d64024a90607ea15c7b9452b012b1f3915f1eef421aea763f4e150c58f8f24ce6d30f6025ec23e7cbf968c27fafdf05f26e837d5d4d8dd282d35503", "b9c6de7cd7d429aad29848ac90998bb125ad7294cf41d0f1b3cdadb8df7ea60e4715fff90e924efeda60e1dc7c1703605bc7edee1c1ffa8c5418c03f7259c805"] }


Less details
source code | moneroexplorer