Monero Transaction 42cf8792d9008ffcf30b8e094fc7c94daa23d24611183f96ee4c4c2cac3fa7d2

Autorefresh is OFF

Tx hash: 42cf8792d9008ffcf30b8e094fc7c94daa23d24611183f96ee4c4c2cac3fa7d2

Tx prefix hash: f186c6d78fe7d10b7715e766989ac534b3ba857297d1dfc0517bd3c2135b235b
Tx public key: 2ca36f45cd85ca7c8851b8ea834fe9efe015964a748b6f5095731977933a198b
Payment id: 166326bb31274da7814099da099607faf63a3b9e34064fd382be6449146cd5d3

Transaction 42cf8792d9008ffcf30b8e094fc7c94daa23d24611183f96ee4c4c2cac3fa7d2 was carried out on the Monero network on 2014-07-02 15:33:46. The transaction has 3191836 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1404315226 Timestamp [UTC]: 2014-07-02 15:33:46 Age [y:d:h:m:s]: 10:168:09:11:03
Block: 111263 Fee (per_kB): 0.005000000000 (0.013726541555) Tx size: 0.3643 kB
Tx version: 1 No of confirmations: 3191836 RingCT/type: no
Extra: 022100166326bb31274da7814099da099607faf63a3b9e34064fd382be6449146cd5d3012ca36f45cd85ca7c8851b8ea834fe9efe015964a748b6f5095731977933a198b

5 output(s) for total of 0.495000000000 xmr

stealth address amount amount idx tag
00: 4546f8b15fa37be5c0506759357af85e0a7a3ea9fbfabd669b31a9c8aa2c1ba1 0.005000000000 181676 of 308585 -
01: 7f6af6ecb470e6084d7748d87370e7d8787d08c9f3b1c5f85f3fa34fd70d5042 0.020000000000 195428 of 381492 -
02: 15efd1581305c7eae1e1f90007db28faac64aee06ffb11b28c744101330d2e73 0.070000000000 79454 of 263947 -
03: a631d2342f1a1abe85d52d5034047703ff1b27cbba6ce91745ff38a92a5761ba 0.100000000000 220602 of 982315 -
04: e781c50daa41074020652a01752d33e0686cff79157b7290ebad875789508beb 0.300000000000 79859 of 976536 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-02 07:38:30 till 2014-07-02 09:38:30; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|

1 inputs(s) for total of 0.500000000000 xmr

key image 00: dd9333488e093a972e21b6b047c5b61fac7f00bb359252a37ef2211f19e5cd4f amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 265008b4571ce2fce885ff12330fe17d0ef0bff3ca872f2f96f5587eefc51594 00110865 1 22/60 2014-07-02 08:38:30 10:168:16:06:19
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 500000000000, "key_offsets": [ 82975 ], "k_image": "dd9333488e093a972e21b6b047c5b61fac7f00bb359252a37ef2211f19e5cd4f" } } ], "vout": [ { "amount": 5000000000, "target": { "key": "4546f8b15fa37be5c0506759357af85e0a7a3ea9fbfabd669b31a9c8aa2c1ba1" } }, { "amount": 20000000000, "target": { "key": "7f6af6ecb470e6084d7748d87370e7d8787d08c9f3b1c5f85f3fa34fd70d5042" } }, { "amount": 70000000000, "target": { "key": "15efd1581305c7eae1e1f90007db28faac64aee06ffb11b28c744101330d2e73" } }, { "amount": 100000000000, "target": { "key": "a631d2342f1a1abe85d52d5034047703ff1b27cbba6ce91745ff38a92a5761ba" } }, { "amount": 300000000000, "target": { "key": "e781c50daa41074020652a01752d33e0686cff79157b7290ebad875789508beb" } } ], "extra": [ 2, 33, 0, 22, 99, 38, 187, 49, 39, 77, 167, 129, 64, 153, 218, 9, 150, 7, 250, 246, 58, 59, 158, 52, 6, 79, 211, 130, 190, 100, 73, 20, 108, 213, 211, 1, 44, 163, 111, 69, 205, 133, 202, 124, 136, 81, 184, 234, 131, 79, 233, 239, 224, 21, 150, 74, 116, 139, 111, 80, 149, 115, 25, 119, 147, 58, 25, 139 ], "signatures": [ "36c772dd6b3871b8a3d35aa4d8685e347218ba267c77379b2c8b12b78b8b4a0917b2b28a8f3a425a7ff9a17004544f8436d4d5864d19b4be3f3f4e8faf423a0a"] }


Less details
source code | moneroexplorer