Monero Transaction 242b830b8b6d1575af8d2b5a9bba31c6be14cad9c2f225cf3016975a0d7ebc3d

Autorefresh is ON (10 s)

Tx hash: 242b830b8b6d1575af8d2b5a9bba31c6be14cad9c2f225cf3016975a0d7ebc3d

Tx public key: a106dfc7c90c4c54a3a37bb07bcda4d8537bd27135943e7c12c3135b5674b042

Transaction 242b830b8b6d1575af8d2b5a9bba31c6be14cad9c2f225cf3016975a0d7ebc3d was carried out on the Monero network on 2014-06-02 07:29:36. The transaction has 3211024 confirmations. Total output fee is 0.000001575121 XMR.

Timestamp: 1401694176 Timestamp [UTC]: 2014-06-02 07:29:36 Age [y:d:h:m:s]: 10:164:03:11:59
Block: 67248 Fee (per_kB): 0.000001575121 (0.000002212516) Tx size: 0.7119 kB
Tx version: 1 No of confirmations: 3211024 RingCT/type: no
Extra: 01a106dfc7c90c4c54a3a37bb07bcda4d8537bd27135943e7c12c3135b5674b042

10 output(s) for total of 0.900023424879 xmr

stealth address amount amount idx tag
00: c66010ee85bb88ae4bf9b1da4d4b97d733d9682d79e23780b8e4f5cc571dba7c 0.000000424879 0 of 1 -
01: 778bc3c7355cc50d6512ebe5b148084929e94a348593f6315d47a56e0b7cac43 0.000006000000 12117 of 42147 -
02: 9e36f2f83d76b0c5e3f109a0cd8cf78f02a65e4a834410ebeb3048df1209930c 0.000007000000 12055 of 41473 -
03: 738f210d868770a36ef92d9ab1a949c6d657689b5d31cd03a04fc7fff7d14223 0.000050000000 26952 of 58904 -
04: 7850da9f6b03f0ce85aaeb3372610b55feb6b2f8dcdd7b076ba772315ef57b63 0.000060000000 26758 of 59217 -
05: efac60dc3c546d74664d1475e2d9e787d01c335801b0b9c43ce015e0cfe06d1b 0.000900000000 27470 of 81915 -
06: 8c7f221ef088ee8e2d63026150f1a6bcfecf414907e541883e2dac3c6de42bb4 0.009000000000 32377 of 233398 -
07: 3a07e86f643aadef9e0c93a3e0fb76a32145b4c38ab94db1fb9c6bb205b74cf5 0.010000000000 65710 of 502466 -
08: 1d5d8f7a5b2d3dae72ac0b4b08eafd1205364afd558853d25e907e5907606396 0.080000000000 17281 of 269576 -
09: e802f67494a1b24d7ca1d1298d25ecfb97bc8e92b805a1fe26706b7ecc770c89 0.800000000000 9680 of 489955 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



3 inputs(s) for total of 0.900025000000 xmr

key image 00: 4089651ba492932cf7311963b7842fd4682dd62a3265daad36e2cdafe1e418bc amount: 0.000005000000
ring members blk
- 00: 8ad2aa14a13ec9a700afd87f812bffac37ad22987e48e00743cc4e754e0fcc4e 00067060
key image 01: 8525f089367281ece13516bc9306dd15a39d0ab22a47618e639ddc49e53bbdb1 amount: 0.000020000000
ring members blk
- 00: 4937574d084fd5ec703196bbe6f07a0221d17943d081b8c881d99ca95b7b1517 00065410
key image 02: 945f75308d262d8eb19e00076d7f752f2b8b29f8c015601081102474db4baa1d amount: 0.900000000000
ring members blk
- 00: af7fec605fa38e03676b8b15800caabb4ac01011cb35ce49994a42392ce9a902 00061081
More details
source code | moneroexplorer