Monero Transaction 42f5788c8a010e2a2d1f751d4caae2ef8d9a29121929e32dbd3de0352daf41ef

Autorefresh is OFF

Tx hash: 42f5788c8a010e2a2d1f751d4caae2ef8d9a29121929e32dbd3de0352daf41ef

Tx public key: 2fa4631291eeb7ac068000af1d14dc970fd433dc77cecd008b13484fbcb273ab
Payment id: e929cc97142f010a5af5fa78956c8f30c35dc570828b0e92089d84fc27050469

Transaction 42f5788c8a010e2a2d1f751d4caae2ef8d9a29121929e32dbd3de0352daf41ef was carried out on the Monero network on 2014-12-15 19:46:19. The transaction has 2960117 confirmations. Total output fee is 0.170000000000 XMR.

Timestamp: 1418672779 Timestamp [UTC]: 2014-12-15 19:46:19 Age [y:d:h:m:s]: 10:010:21:29:27
Block: 349279 Fee (per_kB): 0.170000000000 (0.079743472286) Tx size: 2.1318 kB
Tx version: 1 No of confirmations: 2960117 RingCT/type: no
Extra: 022100e929cc97142f010a5af5fa78956c8f30c35dc570828b0e92089d84fc27050469012fa4631291eeb7ac068000af1d14dc970fd433dc77cecd008b13484fbcb273ab

2 output(s) for total of 1.900000000000 xmr

stealth address amount amount idx tag
00: eeb544ba4c95c7a1fa19ae6b7dd8d5493a52333a8d485f0d2af968ef63cabb95 0.900000000000 180722 of 454894 -
01: ef80b05bcf1745e0b0be7b41f18e50d96f25bfad924c02e956a9ba13b1f50cdc 1.000000000000 366502 of 874630 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



19 inputs(s) for total of 1.270000000000 xmr

Only 10 inputs are shown. To see all, click "more details"
key image 00: f07defd65035ab06a4892032659ad9c0d85a29460fe292372cb9c4d556dc709c amount: 0.100000000000
ring members blk
- 00: aaca6d18854f831b1f11a29d7c91cc7375070916d3605b45e029c573825a0a2b 00196665
key image 01: 0cf9536568722a8b036eea2fc24c9c218af741962da8725eb2edf2550977c907 amount: 0.200000000000
ring members blk
- 00: e1f1cca19c84b6bc965740379d53c5dd95f55cd3cce42cc927487de80c70f11d 00234285
key image 02: 336ca89362de8ec96dd2eeea8f44ef317de7bb72fdbe2aef510ffb4009795d13 amount: 0.300000000000
ring members blk
- 00: f71e62b34d50cc5be300a27656062f54fa701883546d33b00fb98e1fc990069e 00349103
key image 03: 3f75471b4abf91c761eff8e1d0ef08a562eeecc78c5fbb8536218710dc83551e amount: 0.100000000000
ring members blk
- 00: caf0a5b63dba4b2156338c9cc959913959e9e29e3c401619a349548846b8a7f5 00224929
key image 04: 1d9af445abf19f476fc51b0400f7cbccef5a8bda55e1862095a0a93e8c2dd90b amount: 0.070000000000
ring members blk
- 00: 5cd47c5d56bca19b62687e11d6cc9a0d1ae37782167dc6e85f0382735f169671 00230728
key image 05: c19fb2fbd224e1dd6540d9d9c355617a9fc0ef14f448a42adeaa0c14cbd78e3b amount: 0.100000000000
ring members blk
- 00: e88b84fd32893771b92e3f5a9b87c04037e050b4aea8688aaeb987b51c818492 00192719
key image 06: ee11910a23caa60511aa26dc15d7d0c0f5b79bdd62abfef677d053ff0342b36d amount: 0.100000000000
ring members blk
- 00: 6b90bbb3f4cc5142c42072080fd1e8be4f5dc3f4fbe0a8ac0126f8ef35c8fe59 00236211
key image 07: 7b20100ab389795f2e47864e4f42395331d58442e7c7e41a7eb83c91b47d4c99 amount: 0.100000000000
ring members blk
- 00: 994970e4e8b96cc0e1b10aac551ca5256c78d4bd7c755251b7839dd03437ff0f 00237549
key image 08: 73d7fb636d5d3a66e7a8830956bfc190c939f3f14320a8740540858c2e695e04 amount: 0.080000000000
ring members blk
- 00: 185b07efb9a6b8a6a5a187200e97414eca45cc3a168a88a020bdd17dd5526812 00306834
key image 09: 00a77f50a98e6a95106ddd666a8250a9ddf3b1486080b76b66c241e330d13b6b amount: 0.100000000000
ring members blk
- 00: 65ea30c2c2503729d97f1fad774fda71692ba97882b66700cb3c787922e94420 00196160
key image 10: 0e1bbb309cf033003d54953c8634acf66cb08be652fec88a089241e5036166e8 amount: 0.020000000000
ring members blk
- 00: c23a7434e7703bc0474486b33fa5fca8802e4cc7c0ef7827d25a58e88125dc0a 00192019
More details
source code | moneroexplorer