Monero Transaction 4042bf6db6565c20078ef81f80c5aaaf8a7b5f529ef607defdc6327f205e462a

Autorefresh is OFF

Tx hash: 4042bf6db6565c20078ef81f80c5aaaf8a7b5f529ef607defdc6327f205e462a

Tx public key: 66073ea25edb735ef7e3f141eaacd238db00ef166d2261c55ff3f29eabf63e72
Payment id: f7634dfd2ca2c525091aae6a08a4c1e64588851102cb08c616a69671086aeefa

Transaction 4042bf6db6565c20078ef81f80c5aaaf8a7b5f529ef607defdc6327f205e462a was carried out on the Monero network on 2016-12-30 14:42:38. The transaction has 2083250 confirmations. Total output fee is 0.004439336600 XMR.

Timestamp: 1483108958 Timestamp [UTC]: 2016-12-30 14:42:38 Age [y:d:h:m:s]: 07:341:15:24:51
Block: 1212836 Fee (per_kB): 0.004439336600 (0.003744547511) Tx size: 1.1855 kB
Tx version: 1 No of confirmations: 2083250 RingCT/type: no
Extra: 022100f7634dfd2ca2c525091aae6a08a4c1e64588851102cb08c616a69671086aeefa0166073ea25edb735ef7e3f141eaacd238db00ef166d2261c55ff3f29eabf63e72

14 output(s) for total of 2.075560663400 xmr

stealth address amount amount idx tag
00: c01cb74cbe8a534445289a7ef89e1deddde8ecc8f777c57ad75105549fa60c5c 0.000000000400 12839 of 17416 -
01: c6aeaebd9a6531b3466156c76c28bd96bface19c7397371c5ee4dd63b301e4e7 0.000000003000 13088 of 17521 -
02: c0df768cde7475d3cbeb7237174ec8c96d1b590ea17db0406454e24ae9d8cef2 0.000000060000 17584 of 22632 -
03: abc4102ef876ccdb3f8226498fd0bf4bf4f4f3e1dd16be74d59e1435817fbfc3 0.000000600000 17513 of 22710 -
04: 866de0628ecbacd1965726cb88a302db0ecd16bd5380b487b751de51f18f290e 0.000060000000 53939 of 59217 -
05: 7a28c2443167b84de061fb7d4be8322c8dd6b82710024ff025b85f30ac20ca20 0.000500000000 71550 of 77939 -
06: 27dd54cb3c36aea53c9ec22d33bf39a932955b09e434983eda7475737f2b3d90 0.001000000000 90985 of 100400 -
07: 7bff87d0efa87652f55f300bf1a011d45ae5a3023ccdf35f5736862475c84d5f 0.002000000000 86786 of 95915 -
08: c4334a0338a380c2d613bc186826f30434290badf34d045a594570007cf6cc93 0.002000000000 86787 of 95915 -
09: 2f2c6d99dca47c8f62959d6ba1530e9ab178c02cd0e1715a43f8ef2cb6cf5899 0.080000000000 261258 of 269576 -
10: af79b2f4f1cd31a91b6d6f8691633db9514b2407589bca1a599144a5541af487 0.090000000000 303530 of 317822 -
11: 82e5cefd154b0061e99b950f2bab96a1f9fd42b05fe02e36ff18414ec0792e3b 0.200000000000 1251948 of 1272210 -
12: f2ee9826494af1f1fbfb9aa9e3337a6f14700ec8ccb0c86d2ba29a5799ad9add 0.700000000000 506607 of 514467 -
13: 42a82d1112131ae776fc41302034ce41a2727ea5a68483cb04db6b178e7d0f92 1.000000000000 859537 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 2.080000000000 xmr

key image 00: 683c92bb9224e12dc3eb705e5a03c9218a1004916ade4ea12cb1f38f4d28f442 amount: 0.080000000000
ring members blk
- 00: 6a8e84a8adac80be17f5b8e73015bafee8969821943bc2b79b87ad82b9f16149 00187760
- 01: be463e992410c403627027140f31acc819d479431d6e945c6500e7a18df3d105 00846299
- 02: 62cf8ab374488bab4f091ae42180edbdeb84f507b13db40883c7ba7871dcf4da 00981872
- 03: 4411db807bb1ea08b548c9897bad19ca73cf5476d4d7875666bd77dec7a0a1ea 01210770
key image 01: 7693f17772992d7f0fcf06cec80caa0421b9e304be08bd847ad5c16f5e67a935 amount: 2.000000000000
ring members blk
- 00: 3fd58bc56c18a29648061564335362e6d1bc8a7cc887d51a5e26609ea3aa5078 00343012
- 01: 7962b5d1819abd7e06147315b895f653fb955ff2cb6f5ae65be3d2c226b3fca5 00368379
- 02: c97fa05fb8eb4e19146138b252ed8cafc5cdc2e3f23eb82eb9818f414be6ffb7 00374164
- 03: 9ea0b1a769fb97334b05db5f116bf84a5a8a08529cd8f4d2c41f08c2760e9cc8 01210770
More details
source code | moneroexplorer