Monero Transaction 06503a3f9f84441d1acac5f192bdd20369b51f8f6a6ee3701267bfd181a86c87

Autorefresh is OFF

Tx hash: 06503a3f9f84441d1acac5f192bdd20369b51f8f6a6ee3701267bfd181a86c87

Tx prefix hash: 75f5f108fb47e0042356839a7570d7b5838b159b39e5d728e3b7c7108203a06b
Tx public key: 50bfc3067248aa7a88e65c7a58e43d54164c66ed2e7eefff045bdb08086993d7

Transaction 06503a3f9f84441d1acac5f192bdd20369b51f8f6a6ee3701267bfd181a86c87 was carried out on the Monero network on 2014-06-02 22:56:19. The transaction has 3210193 confirmations. Total output fee is 0.000001053063 XMR.

Timestamp: 1401749779 Timestamp [UTC]: 2014-06-02 22:56:19 Age [y:d:h:m:s]: 10:163:13:57:49
Block: 68149 Fee (per_kB): 0.000001053063 (0.000001565075) Tx size: 0.6729 kB
Tx version: 1 No of confirmations: 3210193 RingCT/type: no
Extra: 0150bfc3067248aa7a88e65c7a58e43d54164c66ed2e7eefff045bdb08086993d7

9 output(s) for total of 0.039999946937 xmr

stealth address amount amount idx tag
00: 4ec2f041810b15a310c0d5dadba9e01455d19b3f94a8462b3995412264dc37c5 0.000000946937 0 of 1 -
01: ebba07b02db361dec418cdca42cb891f33446885784b79ec0f0f623fbb5f96f4 0.000009000000 15276 of 46395 -
02: 962671804d1d7483a0145f04ecef3026d2348be8a437b82fb38612e5a614fc5b 0.000030000000 27135 of 59483 -
03: 5c4c457a52191614930bc76efd4c423cee23174ac8182590ce2cb7605ded3101 0.000060000000 26863 of 59217 -
04: a26cc463609e48ed84176d83cfe11cbc6a040bed8a9abd43c86abdc15c4dc862 0.000200000000 27562 of 78038 -
05: d94ea7649c84981a73263c6a301702c83ad3300cf392eb6199864c3873e53135 0.000700000000 26828 of 77522 -
06: eb6f3d317380beda89799e67c75a99bb049d017c0fe5dba7feca09bbd21f6732 0.001000000000 35675 of 100400 -
07: ddb0068ef809c38034b0e554b31094ad93f46ffa271df25957b0ee94984b1919 0.008000000000 35030 of 245068 -
08: 37fb0498df0a514d37721f08aa134a6f68fa9b2d7a0bbdc40f7e82fd7890aa2e 0.030000000000 32609 of 324336 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-01 15:22:11 till 2014-06-02 23:41:44; resolution: 0.01 days)

  • |____________________________________________________________________________________________________________________________________________________________________*_____|
  • |________________________________________________________________________________________*_________________________________________________________________________________|
  • |______*___________________________________________________________________________________________________________________________________________________________________|

3 inputs(s) for total of 0.040001000000 xmr

key image 00: 786d00e7fd35387b75c0b929c6faf148053abf909d0c7684ad7b547cb07e8029 amount: 0.000001000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9a7c8db5c694a3a85aa6cf4ce3c8b2c1f13598f10027d75388b5a4046cde54b1 00068131 1 4/13 2014-06-02 22:41:44 10:163:14:12:24
key image 01: c801eedebca83953ea9685a5429ae413ca440c69e41fc2518e953d03a912d3fb amount: 0.020000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 49882cc82f1d4c85c5bbe8c23aaea3fcd4f229534110ae26b83b417a050b53b7 00067281 1 4/12 2014-06-02 08:04:10 10:164:04:49:58
key image 02: 33c3157ade965bbc926512822199db0323f36c056f4bb251ced45dfa9e38a9e2 amount: 0.020000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 40e22f42c32ccd1b3919f01335b40ec198cc01801822bcbcbfafb29531a52a6a 00066418 1 79/14 2014-06-01 16:22:11 10:164:20:31:57
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 1000000, "key_offsets": [ 11966 ], "k_image": "786d00e7fd35387b75c0b929c6faf148053abf909d0c7684ad7b547cb07e8029" } }, { "key": { "amount": 20000000000, "key_offsets": [ 41847 ], "k_image": "c801eedebca83953ea9685a5429ae413ca440c69e41fc2518e953d03a912d3fb" } }, { "key": { "amount": 20000000000, "key_offsets": [ 40095 ], "k_image": "33c3157ade965bbc926512822199db0323f36c056f4bb251ced45dfa9e38a9e2" } } ], "vout": [ { "amount": 946937, "target": { "key": "4ec2f041810b15a310c0d5dadba9e01455d19b3f94a8462b3995412264dc37c5" } }, { "amount": 9000000, "target": { "key": "ebba07b02db361dec418cdca42cb891f33446885784b79ec0f0f623fbb5f96f4" } }, { "amount": 30000000, "target": { "key": "962671804d1d7483a0145f04ecef3026d2348be8a437b82fb38612e5a614fc5b" } }, { "amount": 60000000, "target": { "key": "5c4c457a52191614930bc76efd4c423cee23174ac8182590ce2cb7605ded3101" } }, { "amount": 200000000, "target": { "key": "a26cc463609e48ed84176d83cfe11cbc6a040bed8a9abd43c86abdc15c4dc862" } }, { "amount": 700000000, "target": { "key": "d94ea7649c84981a73263c6a301702c83ad3300cf392eb6199864c3873e53135" } }, { "amount": 1000000000, "target": { "key": "eb6f3d317380beda89799e67c75a99bb049d017c0fe5dba7feca09bbd21f6732" } }, { "amount": 8000000000, "target": { "key": "ddb0068ef809c38034b0e554b31094ad93f46ffa271df25957b0ee94984b1919" } }, { "amount": 30000000000, "target": { "key": "37fb0498df0a514d37721f08aa134a6f68fa9b2d7a0bbdc40f7e82fd7890aa2e" } } ], "extra": [ 1, 80, 191, 195, 6, 114, 72, 170, 122, 136, 230, 92, 122, 88, 228, 61, 84, 22, 76, 102, 237, 46, 126, 239, 255, 4, 91, 219, 8, 8, 105, 147, 215 ], "signatures": [ "ce29a03d1da03278e6ec3ad9385e70f7446a074737b45eceea9c26fe98c0f2051119b4a6c0a43586ded769dda149197af80f3ef035de2584d0cd548e63351705", "ad642a6952790b054291964bcdac05f4631b68f977c7cdf215c4e74e324b8202f30f9a4bef2834c282447660c34d53e6bb45a213a9eead6f01328e7e1a991104", "8703370b822cbbe4b7e7f42176c05a5c80e514969cd5e448c0df1706833893027b85b631d6c6885e89d428a7fb01fda0a788b92a44310b3ba7d278054b47200c"] }


Less details
source code | moneroexplorer