Monero Transaction 42d6e68c4a85b7c9b90ad665dcecb490f1f5f306e865eb53d52b80cb5af4d093

Autorefresh is OFF

Tx hash: 42d6e68c4a85b7c9b90ad665dcecb490f1f5f306e865eb53d52b80cb5af4d093

Tx prefix hash: a652e315022f93fb015b46a0e1319d391d7df1c0102788a980c1a14c336f37b7
Tx public key: 4d68bbca4b7765fbe14767058f8e14bb9b2041da2c4a91cd7f78b9fae907bdce
Payment id: 5a49c458270d0f6ba2017189fa7374571a4aa6a2d0738c9f42c7ee6be7592e11

Transaction 42d6e68c4a85b7c9b90ad665dcecb490f1f5f306e865eb53d52b80cb5af4d093 was carried out on the Monero network on 2014-08-12 14:14:58. The transaction has 3130800 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1407852898 Timestamp [UTC]: 2014-08-12 14:14:58 Age [y:d:h:m:s]: 10:124:11:06:26
Block: 170187 Fee (per_kB): 0.010000000000 (0.028054794521) Tx size: 0.3564 kB
Tx version: 1 No of confirmations: 3130800 RingCT/type: no
Extra: 0221005a49c458270d0f6ba2017189fa7374571a4aa6a2d0738c9f42c7ee6be7592e11014d68bbca4b7765fbe14767058f8e14bb9b2041da2c4a91cd7f78b9fae907bdce

2 output(s) for total of 0.990000000000 xmr

stealth address amount amount idx tag
00: d23f991e8dacdd8425ba010dfa263ee4e3a2b9d4e8af6e3ce332d95fe13538bb 0.090000000000 103429 of 317822 -
01: 8460dddce80d993fcda3ae6cbaf4159c133d3841ce85bef8787a57e4a7e81e47 0.900000000000 84518 of 454894 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-08-12 10:10:30 till 2014-08-12 14:06:40; resolution: 0.00 days)

  • |___________________________________________*______________________________________________________________________________________________________________________________|
  • |_______________________________________________________________________________________________________________________________*__________________________________________|

2 inputs(s) for total of 1.000000000000 xmr

key image 00: 9967480ba570e798f0a1294fedd684b6318e227b737c185a68abdf42e771bf63 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 604b2260d2c7622b32136c4e48db4187e922fac7f03b1a5dda56a0cf4cf0f1c4 00170040 1 10/59 2014-08-12 11:10:30 10:124:14:10:54
key image 01: d28f773ad82eb5264105a47d72337cbb25ab56c953c3fa25a3c49b7d2771b374 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f5a901fa87fe4bf036594b40d5a37f7bee93db5303d58002b2a162307a9c0f62 00170137 1 11/56 2014-08-12 13:06:40 10:124:12:14:44
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 500000000000, "key_offsets": [ 221095 ], "k_image": "9967480ba570e798f0a1294fedd684b6318e227b737c185a68abdf42e771bf63" } }, { "key": { "amount": 500000000000, "key_offsets": [ 221363 ], "k_image": "d28f773ad82eb5264105a47d72337cbb25ab56c953c3fa25a3c49b7d2771b374" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "d23f991e8dacdd8425ba010dfa263ee4e3a2b9d4e8af6e3ce332d95fe13538bb" } }, { "amount": 900000000000, "target": { "key": "8460dddce80d993fcda3ae6cbaf4159c133d3841ce85bef8787a57e4a7e81e47" } } ], "extra": [ 2, 33, 0, 90, 73, 196, 88, 39, 13, 15, 107, 162, 1, 113, 137, 250, 115, 116, 87, 26, 74, 166, 162, 208, 115, 140, 159, 66, 199, 238, 107, 231, 89, 46, 17, 1, 77, 104, 187, 202, 75, 119, 101, 251, 225, 71, 103, 5, 143, 142, 20, 187, 155, 32, 65, 218, 44, 74, 145, 205, 127, 120, 185, 250, 233, 7, 189, 206 ], "signatures": [ "5aa32704a014bdb4e2c0abd9e592a624b589e81aec3b22a4aebe827db59b1b00ded9fac94544ebdd793ef6233a3b04c8b434089353a56d60499ff92ccdea790c", "07103b03a4bb504b34345474e6be2978a7cf2611205811ba431d0ef0aed708063f7e41f9165041a4f79ac1bbc3fe1b1020b341c2c2d895b7ad73c26ffc343f06"] }


Less details
source code | moneroexplorer