Monero Transaction 6a42d4394a84e23aa4d877e2a4e11b3ddff935dda3f6d68c8099f55e5cb41210

Autorefresh is OFF

Tx hash: 6a42d4394a84e23aa4d877e2a4e11b3ddff935dda3f6d68c8099f55e5cb41210

Tx prefix hash: 8ea45b66aa0af2570d5c98d82380742cd78ca856c91e0a5b5009f48a33fcb01b
Tx public key: 28a9e77304a78298f5eb98f75f02b30db4e208f94d1292bbc770af007e32a386

Transaction 6a42d4394a84e23aa4d877e2a4e11b3ddff935dda3f6d68c8099f55e5cb41210 was carried out on the Monero network on 2014-07-24 11:02:14. The transaction has 3137498 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1406199734 Timestamp [UTC]: 2014-07-24 11:02:14 Age [y:d:h:m:s]: 10:114:17:37:59
Block: 142707 Fee (per_kB): 0.010000000000 (0.022116630670) Tx size: 0.4521 kB
Tx version: 1 No of confirmations: 3137498 RingCT/type: no
Extra: 0128a9e77304a78298f5eb98f75f02b30db4e208f94d1292bbc770af007e32a386

3 output(s) for total of 0.490000000000 xmr

stealth address amount amount idx tag
00: e2a6e3339839b551fcd1f102c9c8ef06961c532dd87c4d7a8a3d96f4110bcfba 0.090000000000 88343 of 317822 -
01: e0a293b1f9ccbcf42620849ff0288ce6be782134426378383920199fc51ad900 0.100000000000 315123 of 982315 -
02: 3c557d114a03d386385181b7961cf68bee815c84c0c6c1fc3d610f4f68ebd76b 0.300000000000 117096 of 976536 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-09 20:43:00 till 2014-07-24 09:47:16; resolution: 0.26 days)

  • |_*___________________________________________________________________________*______________________________*____________________________________________________________*|

1 inputs(s) for total of 0.500000000000 xmr

key image 00: 7f32ae6dcd56a763c5eeb87dea2e686ffabf6a1a78f9a9943014f97f17fded98 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0caebbb611cc01aeada5e5e24ae55ca4bb80c3399d63129eb04834842cd88899 00078111 1 7/137 2014-06-09 21:43:00 10:159:06:57:13
- 01: bab06feef59ee9b72d8a39ed7c1415dffc0f376639978a982124528378c09102 00107286 1 12/38 2014-06-29 21:35:56 10:139:07:04:17
- 02: 0b8ad1aba77491a07bc7588e88090d2c2d0bed974bee2e194976c71896930345 00119398 1 24/61 2014-07-08 07:39:38 10:130:21:00:35
- 03: 34b89158efda24d93f084590a7e9fcc116a7622eb76c644b961db661cf73c833 00142564 4 1/4 2014-07-24 08:47:16 10:114:19:52:57
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 500000000000, "key_offsets": [ 23092, 51158, 28538, 54923 ], "k_image": "7f32ae6dcd56a763c5eeb87dea2e686ffabf6a1a78f9a9943014f97f17fded98" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "e2a6e3339839b551fcd1f102c9c8ef06961c532dd87c4d7a8a3d96f4110bcfba" } }, { "amount": 100000000000, "target": { "key": "e0a293b1f9ccbcf42620849ff0288ce6be782134426378383920199fc51ad900" } }, { "amount": 300000000000, "target": { "key": "3c557d114a03d386385181b7961cf68bee815c84c0c6c1fc3d610f4f68ebd76b" } } ], "extra": [ 1, 40, 169, 231, 115, 4, 167, 130, 152, 245, 235, 152, 247, 95, 2, 179, 13, 180, 226, 8, 249, 77, 18, 146, 187, 199, 112, 175, 0, 126, 50, 163, 134 ], "signatures": [ "65decb91504ae7874a22e07cdc4311669499baac5d127d6923f902c31e528f024a42f8be8a363e0c9db6b95cddf3b05edca50e9186c2342b91910a3f345b8c0d46b22b3dc978dd6ff7369f6a1f9640a0fb4c4401b4efc6af1c02985d47c4d40a4bfaeeb14c4f3cbf13a96a344412a785658ed313dbd83339580cc8bca33d3c0234101ad52e4f7e7d8a575bb736070c5604aa0d5c456506a6f34dc764eb34a401788e8fcd0f097200c26743eeea0562ff5ea47124ba987268fd02ec008b540a04f2a1c954aefd679ee6432654f62d5db3106bbfc9619c009dcd841cecfee1050302db421b02e7eabb4d88f28383d2df99405e6c99fe7b38df0e1e93d1fed73b08"] }


Less details
source code | moneroexplorer