Monero Transaction 3042e4bf3727dffee67b3575fe140ec1624eff65429b9c73b0ddab3d9ce43a40

Autorefresh is OFF

Tx hash: 3042e4bf3727dffee67b3575fe140ec1624eff65429b9c73b0ddab3d9ce43a40

Tx prefix hash: e167f7bb5317c9567df7ee62091376710df8033db2e29b5ee27b64b0cc4eb8f5
Tx public key: b95fdc11ab8286f29d21f204cac1defdb675644001019a891e54c9cabe150193

Transaction 3042e4bf3727dffee67b3575fe140ec1624eff65429b9c73b0ddab3d9ce43a40 was carried out on the Monero network on 2014-05-28 10:03:39. The transaction has 3182246 confirmations. Total output fee is 0.009442601382 XMR.

Timestamp: 1401271419 Timestamp [UTC]: 2014-05-28 10:03:39 Age [y:d:h:m:s]: 10:119:07:12:17
Block: 60220 Fee (per_kB): 0.009442601382 (0.026563801690) Tx size: 0.3555 kB
Tx version: 1 No of confirmations: 3182246 RingCT/type: no
Extra: 01b95fdc11ab8286f29d21f204cac1defdb675644001019a891e54c9cabe150193

3 output(s) for total of 0.891038697077 xmr

stealth address amount amount idx tag
00: df576d46e9263d2c02f012c42fffe25a6a80414318bbc35be98dd932844c2996 0.001038697077 0 of 1 -
01: c190f6520e4f456ce06b370560f3bac376357b0a01a32b0b9a8fe130f3cc0320 0.090000000000 11543 of 317822 -
02: dec1c4b2b7ce59ab3da06dcb4181d78e5c59344295f06134b882eec8440d941a 0.800000000000 8308 of 489955 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-28 05:19:10 till 2014-05-28 10:37:52; resolution: 0.00 days)

  • |________________________________*_________________________________________________________________________________________________________________________________________|
  • |__________________________________________________________________________________________________________________________________________*_______________________________|

2 inputs(s) for total of 0.900481298459 xmr

key image 00: 2f3b06ed17c500c5bc77a6c133f657c4a64f86bceeb8ba3c73a52f8c64d9138c amount: 0.000481298459
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e0829afa7a9f4e47f8bd768d205ea56704e90500fcbd87d1ad77535af505b3ad 00059978 0 0/6 2014-05-28 06:19:10 10:119:10:56:46
key image 01: 7a9ea4a98f050552e246da8cdb5fdc3bf64cb70e52c415a0b9cc6fae266bf773 amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f4ecd5b49b8d18bcba158403f6b2161712b5a896276a93509f6ee63153d87d3a 00060191 1 2/15 2014-05-28 09:37:52 10:119:07:38:04
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 481298459, "key_offsets": [ 0 ], "k_image": "2f3b06ed17c500c5bc77a6c133f657c4a64f86bceeb8ba3c73a52f8c64d9138c" } }, { "key": { "amount": 900000000000, "key_offsets": [ 8714 ], "k_image": "7a9ea4a98f050552e246da8cdb5fdc3bf64cb70e52c415a0b9cc6fae266bf773" } } ], "vout": [ { "amount": 1038697077, "target": { "key": "df576d46e9263d2c02f012c42fffe25a6a80414318bbc35be98dd932844c2996" } }, { "amount": 90000000000, "target": { "key": "c190f6520e4f456ce06b370560f3bac376357b0a01a32b0b9a8fe130f3cc0320" } }, { "amount": 800000000000, "target": { "key": "dec1c4b2b7ce59ab3da06dcb4181d78e5c59344295f06134b882eec8440d941a" } } ], "extra": [ 1, 185, 95, 220, 17, 171, 130, 134, 242, 157, 33, 242, 4, 202, 193, 222, 253, 182, 117, 100, 64, 1, 1, 154, 137, 30, 84, 201, 202, 190, 21, 1, 147 ], "signatures": [ "91739e1654aaede3c1a1848bd8f5ca27d905b868eb08f9b1298dc4fd1e15400384c1e1fc15783c5ba0ddb4b7198f8ae2e1952121c51ca1972b2620980d368001", "52043c7085c84b3ef00bf450f40efe1a6d85326cf4e56e0928e5bcbe509d520e193462e027f944605e85fc2eadc3f840cfa23684f4e74dbcfa635905757be40d"] }


Less details
source code | moneroexplorer