Monero Transaction 420cf842248c2e5110b8412350af5113f5b7324dc225d942658e66b22bd1b801

Autorefresh is OFF

Tx hash: 420cf842248c2e5110b8412350af5113f5b7324dc225d942658e66b22bd1b801

Tx prefix hash: 56ba3e5215bc75d6238e6e940c7136208db408ac429d51f96077078233c1edfd
Tx public key: 338c259fb10f4d44c68f05f25691c3ecc151c52019a871da8cb433a3fddb59c2
Payment id: dadb756022a2d4a47635763b2120e07bdc79e65be0b2c865af98e2e367bf8882

Transaction 420cf842248c2e5110b8412350af5113f5b7324dc225d942658e66b22bd1b801 was carried out on the Monero network on 2015-01-10 17:05:50. The transaction has 2905656 confirmations. Total output fee is 0.015070182848 XMR.

Timestamp: 1420909550 Timestamp [UTC]: 2015-01-10 17:05:50 Age [y:d:h:m:s]: 09:325:10:54:46
Block: 386091 Fee (per_kB): 0.015070182848 (0.016958095864) Tx size: 0.8887 kB
Tx version: 1 No of confirmations: 2905656 RingCT/type: no
Extra: 022100dadb756022a2d4a47635763b2120e07bdc79e65be0b2c865af98e2e367bf888201338c259fb10f4d44c68f05f25691c3ecc151c52019a871da8cb433a3fddb59c2

5 output(s) for total of 20.330000000000 xmr

stealth address amount amount idx tag
00: ae94ce95ff5990e49895987839a91c6f0ff38cfd4d444806c0a5d1db87ac2689 0.030000000000 179600 of 324336 -
01: e83a5d2e3f535c100833e14690d18803254c4ba1cc5e5faca28e19ef762d04c0 0.600000000000 337063 of 650760 -
02: c76aaa2f5aea06cbbdaf9917da20d3d5b4dd9dd6d70143e3cdf8c99762e421db 0.700000000000 242317 of 514467 -
03: 106520e48426c48c214937c93d5066264d1e269901848dfb5851fcfd7f59aa77 9.000000000000 31230 of 274259 -
04: 6c41e3646f2e8ada8a751de39a220b827daa3acd027509fed9b1ae2bc158847b 10.000000000000 446394 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-01-08 19:56:45 till 2015-01-10 15:43:37; resolution: 0.01 days)

  • |______________________________________________________________________________________________________________________________________________________________________*___|
  • |_________________________________________________________________________________*________________________________________________________________________________________|
  • |____*_____________________________________________________________________________________________________________________________________________________________________|
  • |___________________________________________________________________________________________________________________________________________________*______________________|
  • |________________*_________________________________________________________________________________________________________________________________________________________|
  • |__________________________________________________________________________________________________________________________________________________________*_______________|

6 inputs(s) for total of 20.345070182848 xmr

key image 00: 4771f3af8f2c1f8c3068c6434704de26880c7000127f2bdc9f974d7e91c59c7a amount: 0.005070182848
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0331607ac871e4b5c90dc0809bd20829c35f614d6c3616aa39e87209f93faff9 00385943 0 0/4 2015-01-10 14:43:37 09:325:13:16:59
key image 01: cf4541dffc5ae3593b8d27b59737caa1bd08e3f71d9e0203cef9b5ca1870a431 amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 19b01ea10fab292bf412691566cd14b08b534c33d787cd7a9ebb4af1295ed374 00384657 0 0/4 2015-01-09 16:54:51 09:326:11:05:45
key image 02: 5fac2999983fdd1fa88cb4a2bcc82f72d74fcbbacea36530764170c167e78567 amount: 0.040000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a5eb3b3e5d7d975afd1e439b44ad7c983a944185cbd95f0d1063a9d8ff57bb80 00383430 1 4/52 2015-01-08 20:56:45 09:327:07:03:51
key image 03: 09221ee14ea47afa910478b8ed6e25be9044dc4c920b612ab4d97eb1f0cd8286 amount: 0.300000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 130ef5e76badcbba8ba4a5c83e742cffe5916bfd4a84918b5f785e36ae1b8b7b 00385628 0 0/4 2015-01-10 09:55:48 09:325:18:04:48
key image 04: f918af2f6b1378fce0af22dcb06391795369cdfb4bec800a2dee252c8577ce4b amount: 8.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 101e9b74cdb5230e184d1dd412fec2cd480b99c3b1b36df3eac1cfc100b3e6d0 00383608 1 27/2 2015-01-08 23:56:39 09:327:04:03:57
key image 05: 0cb9dec3a2a34dbced281ab1a2ba4f888b8bfa6271f007dc6833f7667014401b amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a56aed1668a6b08829b1c10fcc1ddbdaa700a0f468749c2e86146f7c89b29634 00385743 0 0/4 2015-01-10 11:45:48 09:325:16:14:48
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5070182848, "key_offsets": [ 0 ], "k_image": "4771f3af8f2c1f8c3068c6434704de26880c7000127f2bdc9f974d7e91c59c7a" } }, { "key": { "amount": 2000000000000, "key_offsets": [ 210900 ], "k_image": "cf4541dffc5ae3593b8d27b59737caa1bd08e3f71d9e0203cef9b5ca1870a431" } }, { "key": { "amount": 40000000000, "key_offsets": [ 150199 ], "k_image": "5fac2999983fdd1fa88cb4a2bcc82f72d74fcbbacea36530764170c167e78567" } }, { "key": { "amount": 300000000000, "key_offsets": [ 413821 ], "k_image": "09221ee14ea47afa910478b8ed6e25be9044dc4c920b612ab4d97eb1f0cd8286" } }, { "key": { "amount": 8000000000000, "key_offsets": [ 28864 ], "k_image": "f918af2f6b1378fce0af22dcb06391795369cdfb4bec800a2dee252c8577ce4b" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 445995 ], "k_image": "0cb9dec3a2a34dbced281ab1a2ba4f888b8bfa6271f007dc6833f7667014401b" } } ], "vout": [ { "amount": 30000000000, "target": { "key": "ae94ce95ff5990e49895987839a91c6f0ff38cfd4d444806c0a5d1db87ac2689" } }, { "amount": 600000000000, "target": { "key": "e83a5d2e3f535c100833e14690d18803254c4ba1cc5e5faca28e19ef762d04c0" } }, { "amount": 700000000000, "target": { "key": "c76aaa2f5aea06cbbdaf9917da20d3d5b4dd9dd6d70143e3cdf8c99762e421db" } }, { "amount": 9000000000000, "target": { "key": "106520e48426c48c214937c93d5066264d1e269901848dfb5851fcfd7f59aa77" } }, { "amount": 10000000000000, "target": { "key": "6c41e3646f2e8ada8a751de39a220b827daa3acd027509fed9b1ae2bc158847b" } } ], "extra": [ 2, 33, 0, 218, 219, 117, 96, 34, 162, 212, 164, 118, 53, 118, 59, 33, 32, 224, 123, 220, 121, 230, 91, 224, 178, 200, 101, 175, 152, 226, 227, 103, 191, 136, 130, 1, 51, 140, 37, 159, 177, 15, 77, 68, 198, 143, 5, 242, 86, 145, 195, 236, 193, 81, 197, 32, 25, 168, 113, 218, 140, 180, 51, 163, 253, 219, 89, 194 ], "signatures": [ "093374a9d28393fbb7eac6d5d109d29641bac167567d56a009a03ed519950d0c8d7e7ea809bcaab7df3024b39e1ae12030be6539669c332ee5373fc24dd48101", "b7f82a07ad37adbe8eab00add530bf727d2c33f3800118548b0793c6b5be830076f1ae6c5b6dd3e21a3dac0bf40739b85af9784f55d45442644721f3f99ddb04", "63c5c7c247e463f65a50cde206639fb1f3203f3b4bb37a2f793653e06051850dc3231fb74793428eeff757489674b6507d72d82f548da37ff85e48a166ab1c0d", "395d51f4e091ac4fb0474979968bcc2f68191ba393b7221eecec0e5c9c935908a76279812952fb1e2317d8b2a6730c40ae736e5f40c5be40cc0bbd8f6afa4a06", "80940b8f04e97e74044cd97fd019356b82dfbc3facfe8cf1f200801330ebb80040e6008189e58393a431e8030f4cb1a992af3383e55468b87a149f6089790501", "04d5894cabe0bc2a047bdc384820418c270d4f4a7704d0f20098ed8eaf11e40be032177ec95ad28a45d5ba3b1fd76fd47bb568b6071b830332315405c344c00c"] }


Less details
source code | moneroexplorer