Monero Transaction 42982902020e09d8cfcd093c1c247ba951f3ffcaf65357a1d0db0f9c79263b91

Autorefresh is OFF

Tx hash: 42982902020e09d8cfcd093c1c247ba951f3ffcaf65357a1d0db0f9c79263b91

Tx public key: 9bfe7b3105af394939d9c8d0385ad5dad5beda1f8d4d0edd127a0080a058728a

Transaction 42982902020e09d8cfcd093c1c247ba951f3ffcaf65357a1d0db0f9c79263b91 was carried out on the Monero network on 2014-06-08 06:43:53. The transaction has 3212014 confirmations. Total output fee is 0.008567959059 XMR.

Timestamp: 1402209833 Timestamp [UTC]: 2014-06-08 06:43:53 Age [y:d:h:m:s]: 10:171:10:27:00
Block: 75812 Fee (per_kB): 0.008567959059 (0.009726818267) Tx size: 0.8809 kB
Tx version: 1 No of confirmations: 3212014 RingCT/type: no
Extra: 019bfe7b3105af394939d9c8d0385ad5dad5beda1f8d4d0edd127a0080a058728a

20 output(s) for total of 0.081432040941 xmr

stealth address amount amount idx tag
00: 943ae81b010ee0534f1a6eeb77d65baf7ba1c442388e754744cc1b98d327a816 0.000167417415 0 of 5 -
01: 6feb8b04505d37b699a4c68a0f69c73084cf5c4adae78fdd4c46b5d6a6afb500 0.000167417415 1 of 5 -
02: 70181e4b81ff579a090e24646f4c0d0697cb7753363862e0ff0a8c436794f11f 0.000167417415 2 of 5 -
03: 56d14783dce70da3c88cfdc3bde427ec2cc9962ae22b6d9c20ce28aeab630f66 0.000167417415 3 of 5 -
04: ab3722c3b85da1d5e2c7a0043df9891049af7626731efa2a347b6136666c950b 0.000334834831 0 of 2 -
05: 5a865f8132860985c6fa686d22c934b09b7296431bb98db2ce207e5329522a19 0.000502252247 0 of 3 -
06: 65e717bb588d75e361e272dfcb76f803b0af2185ae2c1873a4282d83384506c1 0.000520573516 0 of 1 -
07: 5e188c023d0cd93ebe0d54a77dee789b1ab0b2b5028308a295d3b5f5a9a0c5c9 0.000536740235 0 of 1 -
08: 5e82fe6da675d5e29ea021991ed2254433f1d9f99350fe15cfb1eeac675a1c92 0.000585960955 0 of 1 -
09: 79731ae7835b60770774e92465bb118eb5e84736c1f0a8a8f796e8ba5ab38f64 0.000655874468 0 of 1 -
10: d704ce95f7006f48ddc970d5adefcd2d0075876e76000a8eebf92ad82733e327 0.000669669663 0 of 2 -
11: 4e1a256b6abc60cead4a36fdfc5e1195cc38de44f9df09874713aa994c33d4ab 0.001004504495 0 of 2 -
12: 9849bd6467b5a4ac48c096aa16f59fed65d31b69545835649d3cabb608e0ccf4 0.001171921911 0 of 1 -
13: f624ca7d873995458481b43212a2854db7ce75373910bc64b1c655c938c35bc3 0.001268990529 0 of 1 -
14: cff4911197dab4221ac71b3e24202fe8c24d6aeb9868e7f9e1fb232115d2c9f6 0.001410357795 0 of 1 -
15: fb611e51b049b780c577c970603182c54b0a422b47b615e7fccb2b0d736930cf 0.001530295632 0 of 1 -
16: f69ceded7959913528aaafaa42b7fe57b836849516dfe2811596b4ef0fbbd172 0.001891716349 0 of 1 -
17: be54240c9c82f5f72ce12cad19ad0ac52fa3d22394ef6b356a2de0cde09cfe9c 0.002678678655 0 of 1 -
18: 0a677406a827ce75b99e07b6f0a5022bc66ca9dc157d7444f532d8aa390968df 0.006000000000 63292 of 256624 -
19: 628cdfe4a1c1681009982407e2ce11040cba064f7d5b149705719b4a55fc9190 0.060000000000 33585 of 264760 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



1 inputs(s) for total of 0.090000000000 xmr

key image 00: bd2d233636df737c94714d45a6ae832ea87e06c1bdfa122639af2c4ecdab3248 amount: 0.090000000000
ring members blk
- 00: fe3e2df7f5895ebab6c8cbfd8bd00ec8fd8444ee0816e938cd2670ec0eecc010 00075671
More details
source code | moneroexplorer