Monero Transaction 006d1cd7893b9999d0c5ca08efef9982e94c9027dc8dff4f8c1b5fe0650b1e2e

Autorefresh is OFF

Tx hash: 006d1cd7893b9999d0c5ca08efef9982e94c9027dc8dff4f8c1b5fe0650b1e2e

Tx prefix hash: 3ccfbc3a5e7ee2c198a6a4e1ada20b3839f849fd7bf13b8934355a596db710f8
Tx public key: 456513d54cbdbab0ec4067aacc2626d51cb3e29aaa7c2fac2d22f21cdf9508de

Transaction 006d1cd7893b9999d0c5ca08efef9982e94c9027dc8dff4f8c1b5fe0650b1e2e was carried out on the Monero network on 2014-11-25 03:47:09. The transaction has 2981697 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1416887229 Timestamp [UTC]: 2014-11-25 03:47:09 Age [y:d:h:m:s]: 10:020:11:18:04
Block: 319710 Fee (per_kB): 0.100000000000 (0.310303030303) Tx size: 0.3223 kB
Tx version: 1 No of confirmations: 2981697 RingCT/type: no
Extra: 01456513d54cbdbab0ec4067aacc2626d51cb3e29aaa7c2fac2d22f21cdf9508de

2 output(s) for total of 0.800000000000 xmr

stealth address amount amount idx tag
00: b315bf8d10c5358257bc27fa5180bbe0ef2c00e79cad35ea1a82ea73c14936b1 0.200000000000 638960 of 1272211 -
01: b4a23c4db480a6749a5917ebdacb1a33472e8b285e9da9c3377d1b878546f4a8 0.600000000000 286984 of 650760 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-11-22 03:35:12 till 2014-11-22 06:39:50; resolution: 0.00 days)

  • |___________________________________________________________________________________________________________________*______________________________________________________|
  • |_______________________________________________________*__________________________________________________________________________________________________________________|

2 inputs(s) for total of 0.900000000000 xmr

key image 00: a125faa050eb8d2db1e3754e04a590c32ef1e179c14e165409e7f27d46378ee3 amount: 0.400000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6d43dbaaf70d140d05625abf42d09e6585512f38abe0e29e0dfd3692f7e489ec 00315563 1 2/53 2014-11-22 05:39:50 10:023:09:25:23
key image 01: b64ac471ad4c2d89fe3f7a38a9283ed5e17c0472b24f33c95e4a1b4f9b6b8e64 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 08229cb831310590b68d14b5e235ce3dc12170233930cbccb3a60a2384511d3f 00315498 1 5/50 2014-11-22 04:35:12 10:023:10:30:01
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 400000000000, "key_offsets": [ 282596 ], "k_image": "a125faa050eb8d2db1e3754e04a590c32ef1e179c14e165409e7f27d46378ee3" } }, { "key": { "amount": 500000000000, "key_offsets": [ 473248 ], "k_image": "b64ac471ad4c2d89fe3f7a38a9283ed5e17c0472b24f33c95e4a1b4f9b6b8e64" } } ], "vout": [ { "amount": 200000000000, "target": { "key": "b315bf8d10c5358257bc27fa5180bbe0ef2c00e79cad35ea1a82ea73c14936b1" } }, { "amount": 600000000000, "target": { "key": "b4a23c4db480a6749a5917ebdacb1a33472e8b285e9da9c3377d1b878546f4a8" } } ], "extra": [ 1, 69, 101, 19, 213, 76, 189, 186, 176, 236, 64, 103, 170, 204, 38, 38, 213, 28, 179, 226, 154, 170, 124, 47, 172, 45, 34, 242, 28, 223, 149, 8, 222 ], "signatures": [ "3c77e0b7b5a468a4a11ee428fb420d8f366e63d1cbec6c41e6435e3904939e0ea62aba70e4dfc5bde889847a6cc346c90ca4aa5eff87a6423fdc7404ad562b0a", "84a43fa12a08b64def6629d7ddfe0adf0191d3820240cc351bb685c83c6e5c0d0dc58d105d926c0b4bcd9d8d18da7a259e0dad330d9b3c24e2d40d014c1a3a07"] }


Less details
source code | moneroexplorer