Monero Transaction 42c10df76c7f23a37ef644a814eeff8a2254fbec244da89c137cc79df4fcd4f1

Autorefresh is OFF

Tx hash: 42c10df76c7f23a37ef644a814eeff8a2254fbec244da89c137cc79df4fcd4f1

Tx public key: 47777b72d303c5f7be3c8c11757392cf3e1f2d7eb043da6fd56f9d17664d3b8c
Payment id: 5cfc678300aa8d5ba93337f9eecaaec45d0acd25ec3aed1ad893a604eee00960

Transaction 42c10df76c7f23a37ef644a814eeff8a2254fbec244da89c137cc79df4fcd4f1 was carried out on the Monero network on 2014-09-30 15:01:54. The transaction has 3070369 confirmations. Total output fee is 0.165413900000 XMR.

Timestamp: 1412089314 Timestamp [UTC]: 2014-09-30 15:01:54 Age [y:d:h:m:s]: 10:089:05:40:40
Block: 240571 Fee (per_kB): 0.165413900000 (0.200691745972) Tx size: 0.8242 kB
Tx version: 1 No of confirmations: 3070369 RingCT/type: no
Extra: 0221005cfc678300aa8d5ba93337f9eecaaec45d0acd25ec3aed1ad893a604eee009600147777b72d303c5f7be3c8c11757392cf3e1f2d7eb043da6fd56f9d17664d3b8c

6 output(s) for total of 124.838510390000 xmr

stealth address amount amount idx tag
00: 8b036cd718039f01137d6dbd0789fe779212c37f996022f4548f9097ba6cb41a 0.038510390000 0 of 1 -
01: 473d163e4930f7426a5ea2cec67a94847b66f7a161619da2d54458a85abd5ebc 0.100000000000 576498 of 982315 -
02: bc4e9a3033132ea6fbe6aa57e82cfb702d6979e0cbe3493fd73c38a83052285c 0.700000000000 162526 of 514467 -
03: 77efcb4ea1254ce89a2f85161a41f1bca73f559932fd0fb13b0400d87d6bd3fb 4.000000000000 117861 of 237197 -
04: 43c046f54e2638997ba960f0a8087e9549943650008c64b1af248a53577bc4b1 20.000000000000 15489 of 78991 -
05: 7cfa5c79e7851ae54bdecd98a7a68256a986575bd6cc5b52267e3081f3e38e6f 100.000000000000 6689 of 57197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



5 inputs(s) for total of 125.003924290000 xmr

key image 00: 060a39ace0951223281f3b38b32e4891c078b62b342e8f5ac609be044cd4728c amount: 0.003924290000
ring members blk
- 00: dfaaafde243c80ad6782f8ae7978b00966c0181de14657e9e45ed16295cf83f8 00230697
key image 01: 0e65232566bbcc560571f396590264773bf5e1b742b5a3cd900801ada39d6217 amount: 10.000000000000
ring members blk
- 00: 5012f7e3472b5bcc023b6c0605be161f09486554751d1bf75badc98d8cd4f59c 00199835
key image 02: e8bb36f05c78df1f30a89d898fa39cab4158929166df4c80c12e748001bdf67a amount: 100.000000000000
ring members blk
- 00: 40468a874c6462f00e78057350650de640e66d8f0c904e311d92955be9ce038c 00100757
key image 03: f2112d7c2826e69a1246c0c38aaac9779fbe1011e7b3e7eb3426c7887ef14653 amount: 10.000000000000
ring members blk
- 00: 2352c5b3cd31d09d77d4d375e5f99da05c123e9267c8674a608c3e5df4fe7119 00215130
key image 04: d0f0ae332c6ab0aee25ac27ecab9e01a1eb86503764c481bec8d330b15774a5d amount: 5.000000000000
ring members blk
- 00: 858ea10f5494e050bb819a5c3fb7b6675c1db41ed2a5978c38a264789b8a8ffb 00171442
More details
source code | moneroexplorer