Monero Transaction 06933910201631c9213f6f1625219681acd9e203a906ea7fe2db96e229422006

Autorefresh is OFF

Tx hash: 06933910201631c9213f6f1625219681acd9e203a906ea7fe2db96e229422006

Tx prefix hash: 31e325a292f3d8ec269110b276facf6bcf81d6a5cfddd8072bc92dbe7f7f48a5
Tx public key: fa29b357fc3f47f713b7d13c5f5f4595ccb4ca4a674250b590c42bfd96638de8
Payment id: c018851d6d7f633a3be0ecbc7e137517756344fa4d0e1d5d20499d1905b564da

Transaction 06933910201631c9213f6f1625219681acd9e203a906ea7fe2db96e229422006 was carried out on the Monero network on 2014-06-22 11:00:26. The transaction has 3205009 confirmations. Total output fee is 0.005108754651 XMR.

Timestamp: 1403434826 Timestamp [UTC]: 2014-06-22 11:00:26 Age [y:d:h:m:s]: 10:176:08:26:25
Block: 96555 Fee (per_kB): 0.005108754651 (0.009598834427) Tx size: 0.5322 kB
Tx version: 1 No of confirmations: 3205009 RingCT/type: no
Extra: 022100c018851d6d7f633a3be0ecbc7e137517756344fa4d0e1d5d20499d1905b564da01fa29b357fc3f47f713b7d13c5f5f4595ccb4ca4a674250b590c42bfd96638de8

4 output(s) for total of 6.015000000000 xmr

stealth address amount amount idx tag
00: f9ae68ea00cc44edadd10ab0d93e31859dbbf92d2aa2392b5ec5e07832573ffc 0.005000000000 170979 of 308585 -
01: 194ea5ac1df27426b402e20ed8218a7ae25b95afef692d3e1256b6aa418b9092 0.010000000000 298213 of 502466 -
02: 1af17e08a5f3099f9f9b02fb18183f3a89958629288ea7de98cccffb3a558a63 1.000000000000 37988 of 874630 -
03: 85cd2b0f58ec0299c50402586c092f5ad6150cf5bc01671aabbb0715b183e32a 5.000000000000 17658 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-22 07:54:44 till 2014-06-22 11:08:32; resolution: 0.00 days)

  • |_____________________________________________________*____________________________________________________________________________________________________________________|
  • |_____________________________________________________________________________________________________________________*____________________________________________________|
  • |____________________________________________________________________________________*_____________________________________________________________________________________|

3 inputs(s) for total of 6.020108754651 xmr

key image 00: 72063a835f80b34d6ce2d060482e5d8a956e5d6c9a2d537a093ddbac79afa6fa amount: 0.000108754651
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 35c4fdbadcb342206c40d64995ab224fe7da4efe48b19d1e3c0d5c49a80bd0a0 00096426 0 0/4 2014-06-22 08:54:44 10:176:10:32:07
key image 01: e7fbbbf0d8ac19a6b501e9a03d9b0f8258d9928ad05f23d2c55bc19fbd36da9c amount: 0.020000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 46c870ea054794ddd751d80803f7b4a628aa404ebae271026b4dbcf4ef94834b 00096505 1 14/11 2014-06-22 10:08:32 10:176:09:18:19
key image 02: 8feb2c9ab8fdcc8280d96fb4b916f66acc67b8899d29a8a3c4058c6086ddb02d amount: 6.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4352447525674e28cb901336da7533eb168de423f721469324b4dca4f5bac838 00096469 0 0/5 2014-06-22 09:30:29 10:176:09:56:22
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 108754651, "key_offsets": [ 0 ], "k_image": "72063a835f80b34d6ce2d060482e5d8a956e5d6c9a2d537a093ddbac79afa6fa" } }, { "key": { "amount": 20000000000, "key_offsets": [ 186993 ], "k_image": "e7fbbbf0d8ac19a6b501e9a03d9b0f8258d9928ad05f23d2c55bc19fbd36da9c" } }, { "key": { "amount": 6000000000000, "key_offsets": [ 59803 ], "k_image": "8feb2c9ab8fdcc8280d96fb4b916f66acc67b8899d29a8a3c4058c6086ddb02d" } } ], "vout": [ { "amount": 5000000000, "target": { "key": "f9ae68ea00cc44edadd10ab0d93e31859dbbf92d2aa2392b5ec5e07832573ffc" } }, { "amount": 10000000000, "target": { "key": "194ea5ac1df27426b402e20ed8218a7ae25b95afef692d3e1256b6aa418b9092" } }, { "amount": 1000000000000, "target": { "key": "1af17e08a5f3099f9f9b02fb18183f3a89958629288ea7de98cccffb3a558a63" } }, { "amount": 5000000000000, "target": { "key": "85cd2b0f58ec0299c50402586c092f5ad6150cf5bc01671aabbb0715b183e32a" } } ], "extra": [ 2, 33, 0, 192, 24, 133, 29, 109, 127, 99, 58, 59, 224, 236, 188, 126, 19, 117, 23, 117, 99, 68, 250, 77, 14, 29, 93, 32, 73, 157, 25, 5, 181, 100, 218, 1, 250, 41, 179, 87, 252, 63, 71, 247, 19, 183, 209, 60, 95, 95, 69, 149, 204, 180, 202, 74, 103, 66, 80, 181, 144, 196, 43, 253, 150, 99, 141, 232 ], "signatures": [ "e6f2aa8c580a6e347ccc7577d9ddc8507f3ea575ea1c1d71e5ab9f397c9fdf0a6afdfe9296e77e335a7724c83218236af1bdd742ecc925a57c846d059ed06609", "50e3c37d981fc8824c8cbc88df3747e2100f17981ea6d39c1d86df5be79072082d38e9ca17170d63c805908d84538638bba8201231e1be1baf4a7d4cc7958903", "bc03fd9d1199865e55137b8b2b88641678ba4ebf9a6b114de225371dcd2a820a0f0237ab327f2ef1ffcd3f5d232b74dcd892182d69e4ba98b179642e7af71107"] }


Less details
source code | moneroexplorer