Monero Transaction 42b6d8a54af6092a0ad0d6c8ee4947d09cdf12605fb3b0d6c35b195674a2d214

Autorefresh is OFF

Tx hash: 42b6d8a54af6092a0ad0d6c8ee4947d09cdf12605fb3b0d6c35b195674a2d214

Tx prefix hash: 62a8971811ec2aead77c60d85a530d68fe1866e84bc84224aa4948c478322cc6
Tx public key: 2ed4fc355042eea36575d3376ee0caf5a04b251499eff09b837371c15a536641
Payment id: 04f9e87f49fc657135d641a7eb0401447e97a6678c312779e2060a94248a4a33

Transaction 42b6d8a54af6092a0ad0d6c8ee4947d09cdf12605fb3b0d6c35b195674a2d214 was carried out on the Monero network on 2014-07-16 23:00:19. The transaction has 3160711 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1405551619 Timestamp [UTC]: 2014-07-16 23:00:19 Age [y:d:h:m:s]: 10:139:07:51:25
Block: 131853 Fee (per_kB): 0.010000000000 (0.014504249292) Tx size: 0.6895 kB
Tx version: 1 No of confirmations: 3160711 RingCT/type: no
Extra: 02210004f9e87f49fc657135d641a7eb0401447e97a6678c312779e2060a94248a4a33012ed4fc355042eea36575d3376ee0caf5a04b251499eff09b837371c15a536641

5 output(s) for total of 89.990000000000 xmr

stealth address amount amount idx tag
00: 30198efe5400bff08d601ec5113fe18b9d4f3fb72eb97e5a8e6a4bb3e4f14be1 0.090000000000 82159 of 317822 -
01: 3fc7ea1bccbf25b75409242fe030aaa87cf34af9e7962f25284dfa52fca3cac2 0.900000000000 56482 of 454894 -
02: 7afc4201c51bb77ff9e6b3368c6fb70cb49e17be6810f3f8579ede5c55b43bf8 9.000000000000 11117 of 274259 -
03: 2e0886d918c5ed7fc61dcd3a2dfe1db920f241bfb036540f1d2b7b890951d9e8 10.000000000000 148948 of 921411 -
04: 82c04f6d1308f841a9cad2646ace631b897ac78961cc6940289227850afff594 70.000000000000 1042 of 24819 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-22 22:07:55 till 2014-07-16 23:44:09; resolution: 0.32 days)

  • |_*___*_________________________________________________________________________________________*______________*________*_________________________________________________*|

1 inputs(s) for total of 90.000000000000 xmr

key image 00: 8eecdaa432149920c3219ef9309441c1dd9b420dd734a68280b6752b3b81a5fd amount: 90.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 258eff3bc59411b0251c2dd5bfb83256c873d71e10ab6fdefe5096c2b26c7406 00052093 1 1/10 2014-05-22 23:07:55 10:194:07:43:49
- 01: 4e96b9a9d6371ab5b38d43736df4b65c335bf3566215e801b2164f52033f22aa 00054318 1 3/5 2014-05-24 10:10:46 10:192:20:40:58
- 02: b9714c29afb610835bd229291562f9943bab08a53f87820e6183a120940a778c 00096774 1 77/10 2014-06-22 14:32:03 10:163:16:19:41
- 03: 06b05b9ac362a0ebdc6e83e45526dd6ff166678bb18ea747a9811f62f5c6ca30 00104162 1 7/5 2014-06-27 18:03:13 10:158:12:48:31
- 04: dd57bb6e47a9616e3ce9831c73a4653f5d2da591afc16da221acd70878cd1a1b 00108047 1 6/3 2014-06-30 10:30:08 10:155:20:21:36
- 05: 5f2a7b3ed5005ee1c0fb605229a354ff3cb93ef28477a1fea82c66c6d69db4c2 00131834 3 6/6 2014-07-16 22:44:09 10:139:08:07:35
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 90000000000000, "key_offsets": [ 213, 38, 632, 366, 103, 691 ], "k_image": "8eecdaa432149920c3219ef9309441c1dd9b420dd734a68280b6752b3b81a5fd" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "30198efe5400bff08d601ec5113fe18b9d4f3fb72eb97e5a8e6a4bb3e4f14be1" } }, { "amount": 900000000000, "target": { "key": "3fc7ea1bccbf25b75409242fe030aaa87cf34af9e7962f25284dfa52fca3cac2" } }, { "amount": 9000000000000, "target": { "key": "7afc4201c51bb77ff9e6b3368c6fb70cb49e17be6810f3f8579ede5c55b43bf8" } }, { "amount": 10000000000000, "target": { "key": "2e0886d918c5ed7fc61dcd3a2dfe1db920f241bfb036540f1d2b7b890951d9e8" } }, { "amount": 70000000000000, "target": { "key": "82c04f6d1308f841a9cad2646ace631b897ac78961cc6940289227850afff594" } } ], "extra": [ 2, 33, 0, 4, 249, 232, 127, 73, 252, 101, 113, 53, 214, 65, 167, 235, 4, 1, 68, 126, 151, 166, 103, 140, 49, 39, 121, 226, 6, 10, 148, 36, 138, 74, 51, 1, 46, 212, 252, 53, 80, 66, 238, 163, 101, 117, 211, 55, 110, 224, 202, 245, 160, 75, 37, 20, 153, 239, 240, 155, 131, 115, 113, 193, 90, 83, 102, 65 ], "signatures": [ "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"] }


Less details
source code | moneroexplorer