Monero Transaction 42a2645ee9527483e4dcf200c65e2ad297e9b56efd2baa7308501ad626d4e032

Autorefresh is OFF

Tx hash: 42a2645ee9527483e4dcf200c65e2ad297e9b56efd2baa7308501ad626d4e032

Tx prefix hash: 5c2cf30bf39479805d9a168ed8610801847a9d64fc418087cd285fdf9db9348a
Tx public key: e736232f433e04d836ed163de8b4c4afd2f138591a21c20b0d520687ae3a6879
Payment id: 464c3a8cebbdbeaa9f0a89ed34fe495792ea0e15f94defbd229c08c68117d3ec

Transaction 42a2645ee9527483e4dcf200c65e2ad297e9b56efd2baa7308501ad626d4e032 was carried out on the Monero network on 2014-07-16 17:30:08. The transaction has 3148792 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1405531808 Timestamp [UTC]: 2014-07-16 17:30:08 Age [y:d:h:m:s]: 10:122:13:30:43
Block: 131486 Fee (per_kB): 0.010000000000 (0.028054794521) Tx size: 0.3564 kB
Tx version: 1 No of confirmations: 3148792 RingCT/type: no
Extra: 022100464c3a8cebbdbeaa9f0a89ed34fe495792ea0e15f94defbd229c08c68117d3ec01e736232f433e04d836ed163de8b4c4afd2f138591a21c20b0d520687ae3a6879

2 output(s) for total of 0.980000000000 xmr

stealth address amount amount idx tag
00: b271682722be1f0e93a1d7ed82ea9b2ce78bcbc46f90537cfa541720c891a463 0.080000000000 78433 of 269576 -
01: b5f285699276c84977b43023921738f8f311c5319cba87d423314964ee8ba3e0 0.900000000000 56193 of 454894 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-16 15:36:29 till 2014-07-16 17:36:49; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|

2 inputs(s) for total of 0.990000000000 xmr

key image 00: 8a126f67b1fae122556cce21f6f2bc1f791e2b7a9c844f093ab8b86a9f8d169b amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 31291c0f2ccf376479290829a44c906997e0fb8561c4818ac5ce423213386c5e 00131429 1 29/62 2014-07-16 16:36:29 10:122:14:24:22
key image 01: e2f46978eb967748ef464d64d2af794b967de8b15e2a8a0ee5db3f3533ab46c7 amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 99f35c3ba72dffe3e3ea8169662e837b6cca2bc1481e225f8b4b31646c8add8a 00131430 1 2/3 2014-07-16 16:36:49 10:122:14:24:02
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 900000000000, "key_offsets": [ 56149 ], "k_image": "8a126f67b1fae122556cce21f6f2bc1f791e2b7a9c844f093ab8b86a9f8d169b" } }, { "key": { "amount": 90000000000, "key_offsets": [ 81943 ], "k_image": "e2f46978eb967748ef464d64d2af794b967de8b15e2a8a0ee5db3f3533ab46c7" } } ], "vout": [ { "amount": 80000000000, "target": { "key": "b271682722be1f0e93a1d7ed82ea9b2ce78bcbc46f90537cfa541720c891a463" } }, { "amount": 900000000000, "target": { "key": "b5f285699276c84977b43023921738f8f311c5319cba87d423314964ee8ba3e0" } } ], "extra": [ 2, 33, 0, 70, 76, 58, 140, 235, 189, 190, 170, 159, 10, 137, 237, 52, 254, 73, 87, 146, 234, 14, 21, 249, 77, 239, 189, 34, 156, 8, 198, 129, 23, 211, 236, 1, 231, 54, 35, 47, 67, 62, 4, 216, 54, 237, 22, 61, 232, 180, 196, 175, 210, 241, 56, 89, 26, 33, 194, 11, 13, 82, 6, 135, 174, 58, 104, 121 ], "signatures": [ "f2ef74bfd5ff9245dbca44b11c0875c5fecfebba2098790d92de9fddd840e4029167e10376f3cff4cd538d1bb81a399dc218d62e6c9099f4ddc7dfd92d2aa405", "18551cc4eaf40f0b120ef0496b6f0a85cb0d42e2eb1c8779b4fc963a20713f0da9fef9e02e0e02579434b7b3d8b34a7a5aaac4d8956c9b8467cce511da8eb800"] }


Less details
source code | moneroexplorer