Monero Transaction 242bdd6df8633c2df00d8c4be6f01d720c0eaf108863a9e24663669e12581b5f

Autorefresh is ON (10 s)

Tx hash: 242bdd6df8633c2df00d8c4be6f01d720c0eaf108863a9e24663669e12581b5f

Tx public key: 18d05428a09b05c38a513a5d9e647a6311ec96ed73811b07e5039bd14d04468c

Transaction 242bdd6df8633c2df00d8c4be6f01d720c0eaf108863a9e24663669e12581b5f was carried out on the Monero network on 2014-06-17 22:52:42. The transaction has 3188485 confirmations. Total output fee is 0.000001000000 XMR.

Timestamp: 1403045562 Timestamp [UTC]: 2014-06-17 22:52:42 Age [y:d:h:m:s]: 10:148:14:37:44
Block: 89873 Fee (per_kB): 0.000001000000 (0.000001001957) Tx size: 0.9980 kB
Tx version: 1 No of confirmations: 3188485 RingCT/type: no
Extra: 0118d05428a09b05c38a513a5d9e647a6311ec96ed73811b07e5039bd14d04468c

9 output(s) for total of 6.005303000000 xmr

stealth address amount amount idx tag
00: 0bd750296a3bbe87cc11468b5a49a870ec9bd9e3b9dc9426ccb29af5e357e345 0.000003000000 18761 of 42340 -
01: 9e189047c81c497d29c33a64bf41fa093e7f35a42d91accc48b07e500c0a87de 0.000300000000 35723 of 78258 -
02: e0c7b17673615bd37a3e20ff2d39246885ebf15c7f9c55d21e6e13cff2476d8b 0.005000000000 150396 of 308584 -
03: bef3851cd306970590b7db1ad12a2c0af7d6d1109cc780b24d6b18517da8c4fe 0.040000000000 95291 of 294095 -
04: f423c5a8bc5fb9b8aa386abcb8128d3db696b3093b338e7bf3f332bca4e45f89 0.060000000000 70568 of 264760 -
05: 5867d29849c26a1d5a83be085245b72dae1ecf188f8c07f431b14156f37e275a 0.200000000000 62717 of 1272210 -
06: 0b6a313ddd8e38f4305332a0d12d7501c7c0448c3b0995702aec8cbbf4f3b53b 0.700000000000 21457 of 514466 -
07: 677232460528bd0c7fff66453357bb8952e047c5a6755fd6eaf70632a0b5fbfe 2.000000000000 14513 of 434057 -
08: 39c417ac64fc3fdc846b8932541a8f56cd1bfa637ab93a863aee1f5f2a762299 3.000000000000 11201 of 300495 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



6 inputs(s) for total of 6.005304000000 xmr

key image 00: 8da7d090619aa706247448cc72557dfe4c64077341d60c823f12ae36b19b5254 amount: 0.003000000000
ring members blk
- 00: 1b9a3af6daaaf07ee9edff1718e4fab238fee087002efc4af262940b61a09ea2 00088080
key image 01: a79f85f336a80fd7763e4d5d90dac19da5ba7e18ad1fe2c9cc16329b340d5f01 amount: 0.000900000000
ring members blk
- 00: da2035f8824f412decbcdcfa509aab7b3a8a195a99778f842b5fe9d0936faee3 00082386
key image 02: 76281d6107e3bf2ecc49cfb6b43d37eddfbe3a90e75bc5745a5a85bcc125db14 amount: 0.001000000000
ring members blk
- 00: 47dce9e5dbf9904b2c779dc6003bb0f0b0d73b325434a87ec6d655153d2e863d 00088173
key image 03: ced7d999a098949d2c3d35914c985639214b2c5e8c8a83cfbe8e11684caa7f60 amount: 0.000004000000
ring members blk
- 00: 429a2f28add4595a483a60797663cc0a5bb86f18612a6acd502498719749c348 00089203
key image 04: fbb9fd8fb07d7cfad5119ee566551ef15628dde7d282ddd298009f951ec1e08b amount: 0.000400000000
ring members blk
- 00: b82ecf90e0d7fec0ba8c571eb9979f4034bf0a782a3585b62be4fcab138c6672 00089203
key image 05: 776907fb10ee6f2a236dfeeaa06e81e83d2fec168c60fc5ee1efb92334076768 amount: 6.000000000000
ring members blk
- 00: 6ac00ad6353fca34387e01d8e01e869b506a1c4b611cc1db72ff24b795b39646 00089282
More details
source code | moneroexplorer