Monero Transaction 042a1ae3c9ac46d81a3fb0b66a5e68172d85e48e8f9574e0f7561652ba2731f4

Autorefresh is OFF

Tx hash: 042a1ae3c9ac46d81a3fb0b66a5e68172d85e48e8f9574e0f7561652ba2731f4

Tx public key: 94fe6ae146325019928f0633ea4ad2dbb43283d3a0f3594155fa55db7b3acdcf

Transaction 042a1ae3c9ac46d81a3fb0b66a5e68172d85e48e8f9574e0f7561652ba2731f4 was carried out on the Monero network on 2014-06-29 11:59:07. The transaction has 3180942 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1404043147 Timestamp [UTC]: 2014-06-29 11:59:07 Age [y:d:h:m:s]: 10:150:00:35:00
Block: 106734 Fee (per_kB): 0.005000000000 (0.005208545270) Tx size: 0.9600 kB
Tx version: 1 No of confirmations: 3180942 RingCT/type: no
Extra: 0194fe6ae146325019928f0633ea4ad2dbb43283d3a0f3594155fa55db7b3acdcf

16 output(s) for total of 12.000000000000 xmr

stealth address amount amount idx tag
00: 1531cb3cf6915a03772ae04c66dfdcb8665ceadaffefdc0f320e1f1843055ca7 0.400000000000 53400 of 688584 -
01: ff5d0a8814fddd009a1648d7bb958c3c50796bcc09703cbeabc966861f1835a9 0.500000000000 72682 of 1118624 -
02: e6bec0aca9ade51f7f6fb5f8dea170e241d1e36a1a27cf696b505ae81b6fdd66 0.500000000000 72683 of 1118624 -
03: 7b0345d5e4574588c28256bdb1baf8ac5cad6cfab873fab0423a1255906203cb 0.500000000000 72684 of 1118624 -
04: d919cd826a14d6c6c23374d50e81579dd8de5fb941a2e7d49a7af8a50f150cf9 0.500000000000 72685 of 1118624 -
05: 66f02de963d1c75a21cef8c7e7de5805384c2f1c36df3c45a05723dc7b6cdbbf 0.500000000000 72686 of 1118624 -
06: 108958a3863c534a150f676f608f0883d3661344845f5832e033d3f765fd44fa 0.500000000000 72687 of 1118624 -
07: 883592ad7461297c0d4580381449b7c904f03ca2fb262e1326d9ba7cd96f3656 0.500000000000 72688 of 1118624 -
08: 13d15cf59fb0c2c666dfb99fd352c355cf8fb3d120854cbed08260eed9e06ab5 0.500000000000 72689 of 1118624 -
09: b1407d476fca124265b5a703c8cfd610420c4c2c1889a53126f85c9270658353 0.500000000000 72690 of 1118624 -
10: f5c140bac14d74b9919e64803282fd56c0e185f8742ca8b9dea07b149f36a7f0 0.500000000000 72691 of 1118624 -
11: 83367754f8304299075c713852f724dd2ae029ac9b5f1719bf48cbb3083edb4e 0.600000000000 43408 of 650760 -
12: 15ba1424d2429eb2d7f01390122916be82d4824d0f51b2b2b878691b1a81fec2 1.000000000000 56776 of 874629 -
13: b06a89882a339885e89b4b9b6166681628963d4cd58d7b21d43ae397d2875977 1.000000000000 56777 of 874629 -
14: 0ad8d313c3af82af6386123187643482a2489a911f840dd7ebfd3a68af207b01 2.000000000000 25595 of 434057 -
15: 9ac0257a3cbb701b846746750f0e54c89393b60c84c2b6e71d246419f5fc4381 2.000000000000 25596 of 434057 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



3 inputs(s) for total of 12.005000000000 xmr

key image 00: cf5b7d2eac8b834f26a81caf655f8faf2e9d24fbb7f67768c362fc30abedca21 amount: 0.005000000000
ring members blk
- 00: 707a8266c4670ae96fe5de98a8be13e1b6d4cd3de542997ad6834023773d2a3d 00103362
key image 01: 6c2bdda2e602ccfd0c6938076fc9b8ba1f7f2e3610a43bac0173e06df57660c0 amount: 10.000000000000
ring members blk
- 00: 4a4a95d7a2685d49ae4d0c4585dd44fd618127ace34f38a171114eb97a4d468b 00106656
key image 02: ee24ba632389af0c68094fddd942975a24974646bcc8064aa5cbbde61be3a6c9 amount: 2.000000000000
ring members blk
- 00: b5893ce725242d649053c618b2607fb6ffed5f81a198ba5264cb8481ae906a32 00106708
More details
source code | moneroexplorer