Monero Transaction 242e3fbf78d8dfb4a7b649cde95ec64f205def8a569c5b035439bd6cffd8c322

Autorefresh is OFF

Tx hash: 242e3fbf78d8dfb4a7b649cde95ec64f205def8a569c5b035439bd6cffd8c322

Tx prefix hash: b5e9dccf2d91a27f867e3c505a5b89c98a315a46f98c64d1ecdd9ba27a094c37
Tx public key: f8e1d7dc9990e2b0c5bb59eab663adfc7339d0d3725e6743668f4849a8ec8bfd

Transaction 242e3fbf78d8dfb4a7b649cde95ec64f205def8a569c5b035439bd6cffd8c322 was carried out on the Monero network on 2014-07-05 06:23:19. The transaction has 3163151 confirmations. Total output fee is 0.005070055603 XMR.

Timestamp: 1404541399 Timestamp [UTC]: 2014-07-05 06:23:19 Age [y:d:h:m:s]: 10:131:01:52:11
Block: 115041 Fee (per_kB): 0.005070055603 (0.004949224917) Tx size: 1.0244 kB
Tx version: 1 No of confirmations: 3163151 RingCT/type: no
Extra: 01f8e1d7dc9990e2b0c5bb59eab663adfc7339d0d3725e6743668f4849a8ec8bfd

15 output(s) for total of 16.995000000000 xmr

stealth address amount amount idx tag
00: d966fe659b0f703839f2290ab408c8446e693dc842735faef926137f07c66a13 0.005000000000 183068 of 308584 -
01: 7ee349b694936c9bca6376e87fc335b2f702421be77d41d2ba1e85ebb94fb172 0.090000000000 74144 of 317822 -
02: 86a13f89faa7d39077ad48b6fed05234ae7137b894ce24d86fdff26b3ebd16cc 0.100000000000 233242 of 982315 -
03: 8b24166d1c0010cce482da158cde03a267e2cceca56174e988093a3f2543bf6a 0.300000000000 83861 of 976536 -
04: 19839cbfe7f63f7a6c331085f91b8cee7c50384762cf9041eb2c56250518c5f8 0.300000000000 83862 of 976536 -
05: 30fc73b10ef6386cddda891eae93b7f75f1f9f809f2ec2ab5bdbf57be7e86b8e 0.500000000000 92021 of 1118624 -
06: 43597614b7dde4250c850334590a546a9adf8bdfa589c33b045159987fb5593d 0.600000000000 56932 of 650760 -
07: dd79c5a5da89e6f93fb7e82ff993cb9e78410c3d695e203de437f6cdf19521a0 0.700000000000 45981 of 514466 -
08: 466f86aed8d26938c30a912ef38d2cbbe11eeefe06cc56abb0902c5b3420b037 0.700000000000 45982 of 514466 -
09: a06dd7651ce95e5ea32682a48c2e6700e36d15f6f254ceccbc8fa7cee60489fa 0.700000000000 45983 of 514466 -
10: 9049f16478e1c22c6ad409ea597386d31aacb17d69149e47aee86549e2e157c3 1.000000000000 73527 of 874629 -
11: 350769e81247085ed4a4aa0e61425a0081e81982bf2f982ef9e42943823e3867 1.000000000000 73528 of 874629 -
12: 9e44a27efe3e239c154af302149e3ee71e6dd964ef6dff3a380481abc937da44 2.000000000000 31728 of 434057 -
13: 09f1f7414452644bf8acc0859ccb73e87819ec61a781a10f1d71bdf7442c651b 4.000000000000 18834 of 237197 -
14: ffaf48313422b6ddaa780a346acd12efb056ab5fccd9f062c0a6dcfec812f26a 5.000000000000 35855 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-03 06:44:13 till 2014-07-05 06:35:30; resolution: 0.01 days)

  • |____*_____________________________________________________________________________________________________________________________________________________________________|
  • |___________________________________________________________________________________________________________________________*______________________________________________|
  • |______________________________________________________________________________________________________________________________________________________________________*___|
  • |______________________________________________________________________________________________________________________________________*___________________________________|

4 inputs(s) for total of 17.000070055603 xmr

key image 00: bb68c96c4ecd07e6408e66eaf34ba2032751de41b9bf65f9992f8da5d28a5ec0 amount: 0.000070055603
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 08ab64b0812d5d57777f10ceeb28d65cff8816845913c75fff3dc8e5e6b3e22f 00112226 0 0/5 2014-07-03 07:44:13 10:133:00:31:17
key image 01: 610e84ad8320be6e941481002fc5d647cad70e287c052a72d3c2fe3c71dcc1a1 amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 2c932a4884854566371aaa3a416abd236ceed32f711f81a4d075b389056a07ce 00114273 0 0/6 2014-07-04 17:31:20 10:131:14:44:10
key image 02: a034ff85804b8f9f202c13ef61309504a93466baba982ea62062d482a5f05518 amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 2716a5b1210424c21c18d0511a13602f14f5697f49c22fa866745f43a4bd29a1 00114979 1 8/9 2014-07-05 05:35:30 10:131:02:40:00
key image 03: 37450548d43ee744639a941e5145c30ef9e5d7ad194a13b70217d702e4b00bb7 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 769113680dee628b186a4351b6b410b8e355ac853a8b478d9f7f485e2d9dc6e9 00114444 0 0/5 2014-07-04 20:38:41 10:131:11:36:49
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 70055603, "key_offsets": [ 0 ], "k_image": "bb68c96c4ecd07e6408e66eaf34ba2032751de41b9bf65f9992f8da5d28a5ec0" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 34860 ], "k_image": "610e84ad8320be6e941481002fc5d647cad70e287c052a72d3c2fe3c71dcc1a1" } }, { "key": { "amount": 2000000000000, "key_offsets": [ 31682 ], "k_image": "a034ff85804b8f9f202c13ef61309504a93466baba982ea62062d482a5f05518" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 127425 ], "k_image": "37450548d43ee744639a941e5145c30ef9e5d7ad194a13b70217d702e4b00bb7" } } ], "vout": [ { "amount": 5000000000, "target": { "key": "d966fe659b0f703839f2290ab408c8446e693dc842735faef926137f07c66a13" } }, { "amount": 90000000000, "target": { "key": "7ee349b694936c9bca6376e87fc335b2f702421be77d41d2ba1e85ebb94fb172" } }, { "amount": 100000000000, "target": { "key": "86a13f89faa7d39077ad48b6fed05234ae7137b894ce24d86fdff26b3ebd16cc" } }, { "amount": 300000000000, "target": { "key": "8b24166d1c0010cce482da158cde03a267e2cceca56174e988093a3f2543bf6a" } }, { "amount": 300000000000, "target": { "key": "19839cbfe7f63f7a6c331085f91b8cee7c50384762cf9041eb2c56250518c5f8" } }, { "amount": 500000000000, "target": { "key": "30fc73b10ef6386cddda891eae93b7f75f1f9f809f2ec2ab5bdbf57be7e86b8e" } }, { "amount": 600000000000, "target": { "key": "43597614b7dde4250c850334590a546a9adf8bdfa589c33b045159987fb5593d" } }, { "amount": 700000000000, "target": { "key": "dd79c5a5da89e6f93fb7e82ff993cb9e78410c3d695e203de437f6cdf19521a0" } }, { "amount": 700000000000, "target": { "key": "466f86aed8d26938c30a912ef38d2cbbe11eeefe06cc56abb0902c5b3420b037" } }, { "amount": 700000000000, "target": { "key": "a06dd7651ce95e5ea32682a48c2e6700e36d15f6f254ceccbc8fa7cee60489fa" } }, { "amount": 1000000000000, "target": { "key": "9049f16478e1c22c6ad409ea597386d31aacb17d69149e47aee86549e2e157c3" } }, { "amount": 1000000000000, "target": { "key": "350769e81247085ed4a4aa0e61425a0081e81982bf2f982ef9e42943823e3867" } }, { "amount": 2000000000000, "target": { "key": "9e44a27efe3e239c154af302149e3ee71e6dd964ef6dff3a380481abc937da44" } }, { "amount": 4000000000000, "target": { "key": "09f1f7414452644bf8acc0859ccb73e87819ec61a781a10f1d71bdf7442c651b" } }, { "amount": 5000000000000, "target": { "key": "ffaf48313422b6ddaa780a346acd12efb056ab5fccd9f062c0a6dcfec812f26a" } } ], "extra": [ 1, 248, 225, 215, 220, 153, 144, 226, 176, 197, 187, 89, 234, 182, 99, 173, 252, 115, 57, 208, 211, 114, 94, 103, 67, 102, 143, 72, 73, 168, 236, 139, 253 ], "signatures": [ "fc64146474a105d0c532eda5057e8cb94b13e2a197e33571dcce7f4c6c53be04db679940c3d1bbd52b91fb76877a013e6655512660134ffa84912b7e7b6dc409", "9425767fd107e6ec54a443ff6f77263019a1004b43dcf0059738e1927b32e306dc769751c003c60d3c79da71058a42b2a8c3a0f3a254c38c88353592d764d207", "1e890a6e5f8bf37eaeadf32a85336b3dccfbcbc6cf950c0caf06e37554e3ba07ad376e355810932d7790b0f79aa1dd2cc5e3298334c7a67c2f6473010fb8750e", "3c6987f37a4dda65f36f57b00f0b68443e16290f4c569dc1826c24e9c423820d9abe04fa22650992f1933a63aeb51a6319acda6c257b0f4a538af4e929563100"] }


Less details
source code | moneroexplorer