Monero Transaction b542c44cabf612731c8d6a530688d20b20a42ddda77945607336742c4127b7a0

Autorefresh is OFF

Tx hash: b542c44cabf612731c8d6a530688d20b20a42ddda77945607336742c4127b7a0

Tx prefix hash: d41f61201366734ab68bc68b544588940cc35d596773f790240e138d18813a46
Tx public key: 45883ca76777612ccc60f9d21e04337d8445ceefe4cedf797ea0b65316d0b3e1
Payment id: 23cdae2fcda314dc18f47539e4fefd04564ae1b79574d61698bb2438d29ea5ce

Transaction b542c44cabf612731c8d6a530688d20b20a42ddda77945607336742c4127b7a0 was carried out on the Monero network on 2015-01-02 01:46:28. The transaction has 2927944 confirmations. Total output fee is 0.105160798829 XMR.

Timestamp: 1420163188 Timestamp [UTC]: 2015-01-02 01:46:28 Age [y:d:h:m:s]: 09:347:23:51:20
Block: 373798 Fee (per_kB): 0.105160798829 (0.286395367024) Tx size: 0.3672 kB
Tx version: 1 No of confirmations: 2927944 RingCT/type: no
Extra: 02210023cdae2fcda314dc18f47539e4fefd04564ae1b79574d61698bb2438d29ea5ce0145883ca76777612ccc60f9d21e04337d8445ceefe4cedf797ea0b65316d0b3e1

5 output(s) for total of 4.894839201171 xmr

stealth address amount amount idx tag
00: 3cfa769a7655d8105900eb0c7c93fc7084d9543707a1fab820b576257e47827c 0.094839201171 0 of 1 -
01: c0bc81e9b853741bc820f74fd0a6fa45e017b53bd64c83c6856cd589a8ec9cba 0.200000000000 710720 of 1272211 -
02: 95c3ddea58a5789e9495190b9d47b84c77ee49cac083182b63eab7fa184083f0 0.600000000000 330163 of 650760 -
03: f36485451cd443d13e3872345dedf4415cdd77c4ca1913290e29419e302f8b26 2.000000000000 198018 of 434058 -
04: 228fdaa5d10bb168960f72990f93ef5346c3a91c61d10b370471dc75e08e7541 2.000000000000 198019 of 434058 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-12-31 11:06:44 till 2014-12-31 13:06:44; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|

1 inputs(s) for total of 5.000000000000 xmr

key image 00: c5a70e8191e1f325709c98c2e71d3fe9f097d9f17dd737f8ab849bf6476b979c amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: dc54997c6773e8311a175faed399a352047c014a1d7e1a249776b04d69c07644 00371619 1 1/6 2014-12-31 12:06:44 09:349:13:31:04
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000000, "key_offsets": [ 136807 ], "k_image": "c5a70e8191e1f325709c98c2e71d3fe9f097d9f17dd737f8ab849bf6476b979c" } } ], "vout": [ { "amount": 94839201171, "target": { "key": "3cfa769a7655d8105900eb0c7c93fc7084d9543707a1fab820b576257e47827c" } }, { "amount": 200000000000, "target": { "key": "c0bc81e9b853741bc820f74fd0a6fa45e017b53bd64c83c6856cd589a8ec9cba" } }, { "amount": 600000000000, "target": { "key": "95c3ddea58a5789e9495190b9d47b84c77ee49cac083182b63eab7fa184083f0" } }, { "amount": 2000000000000, "target": { "key": "f36485451cd443d13e3872345dedf4415cdd77c4ca1913290e29419e302f8b26" } }, { "amount": 2000000000000, "target": { "key": "228fdaa5d10bb168960f72990f93ef5346c3a91c61d10b370471dc75e08e7541" } } ], "extra": [ 2, 33, 0, 35, 205, 174, 47, 205, 163, 20, 220, 24, 244, 117, 57, 228, 254, 253, 4, 86, 74, 225, 183, 149, 116, 214, 22, 152, 187, 36, 56, 210, 158, 165, 206, 1, 69, 136, 60, 167, 103, 119, 97, 44, 204, 96, 249, 210, 30, 4, 51, 125, 132, 69, 206, 239, 228, 206, 223, 121, 126, 160, 182, 83, 22, 208, 179, 225 ], "signatures": [ "ed779324fdb7df1cf25d41df51c1e594414b26758f4ad25206a5faaab175530f15f365c7488a27bef1f464b9e54818ba51599cc259f8133395735d6b4e2c110e"] }


Less details
source code | moneroexplorer