Monero Transaction 06945553c568a808b52a623990c7d06e8546c7b68a681e1465d3a12732280d0d

Autorefresh is OFF

Tx hash: 06945553c568a808b52a623990c7d06e8546c7b68a681e1465d3a12732280d0d

Tx prefix hash: cc343cdfd66ed25e4f14be080f3e3332d984f5f932056e5d37851c5dc4cbe362
Tx public key: ae4c9e9c4159f852a483513fcc4730c97f3178e575c37d1b34ed451b2fa86ea8
Payment id: f147bd6f5cc73359e6ff0e9754740c43d0a8fd6ca1df14fe1871119c8c8e6882

Transaction 06945553c568a808b52a623990c7d06e8546c7b68a681e1465d3a12732280d0d was carried out on the Monero network on 2014-12-13 12:14:39. The transaction has 2942869 confirmations. Total output fee is 0.010450040000 XMR.

Timestamp: 1418472879 Timestamp [UTC]: 2014-12-13 12:14:39 Age [y:d:h:m:s]: 09:349:16:18:34
Block: 346009 Fee (per_kB): 0.010450040000 (0.015947602027) Tx size: 0.6553 kB
Tx version: 1 No of confirmations: 2942869 RingCT/type: no
Extra: 022100f147bd6f5cc73359e6ff0e9754740c43d0a8fd6ca1df14fe1871119c8c8e688201ae4c9e9c4159f852a483513fcc4730c97f3178e575c37d1b34ed451b2fa86ea8

7 output(s) for total of 2000.490000000000 xmr

stealth address amount amount idx tag
00: 4b053aa7a03eddbb0702a0c959bd6a61ad2a359f4b242340e96bdf74ad2d5dc0 0.090000000000 126526 of 317822 -
01: fa397b1afbc030ae4855223c3399c9f4aa3ab6f4b398d7bdf93a4bebcac5b064 0.400000000000 301073 of 688584 -
02: 3cf759eaefc9b17031a80c0e5cf42bb668045fbb1a23fc4c30aabd18a5278cb0 1.000000000000 364651 of 874629 -
03: 189decb381a8bbe758d81eb78ff60fdcffef0c35d6b512995521758bbb2fd668 9.000000000000 28802 of 274259 -
04: e27fd8adaa79b1e33eec20798a0b723b0b9b2cc94333156cef316693e5cdbc07 90.000000000000 6978 of 36286 -
05: 13294fa044c348a8a1eea2d27b433fe86f78d9dab5edd9e946d54f51ade50c5b 900.000000000000 838 of 8187 -
06: d0fe01a7e25e572af569a3ebb9ef53dad70c8d8dc285313f1258b13fa79f0b68 1000.000000000000 1367 of 11881 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-08-23 02:44:32 till 2014-12-11 09:48:14; resolution: 0.65 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_______________________________________________________________________________________________________________________________________________________________*__________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|

3 inputs(s) for total of 2000.500450040000 xmr

key image 00: b6f0ffb329e607734e34ad44840b90c1b31c532b1eb1e0eabebac1f50af1d885 amount: 0.000450040000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b3b84670d433aaa1011b7ecfd09e8c3f1c4fc238236f571604d587267ebde1b7 00185359 2 4/7 2014-08-23 03:44:32 10:097:00:48:41
key image 01: 0e52637ab28e7afb501d4a88b4238cc3e00a7b5d808a724a256bf87d280afb90 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ae9a9e87ad7b18d5c7cc94bacd6e65c11161a213118e6898a27b0cd206854777 00333545 1 96/5 2014-12-04 18:28:47 09:358:10:04:26
key image 02: 945c425f598dab58fb66676b5ea2fcfc187a4739b6459072bec75df69cd900cd amount: 2000.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 881663dde17ecc069c26d5b05242935bc101e02a0325c026223334ef0176d07d 00342868 1 110/11 2014-12-11 08:48:14 09:351:19:44:59
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 450040000, "key_offsets": [ 0 ], "k_image": "b6f0ffb329e607734e34ad44840b90c1b31c532b1eb1e0eabebac1f50af1d885" } }, { "key": { "amount": 500000000000, "key_offsets": [ 500265 ], "k_image": "0e52637ab28e7afb501d4a88b4238cc3e00a7b5d808a724a256bf87d280afb90" } }, { "key": { "amount": 2000000000000000, "key_offsets": [ 562 ], "k_image": "945c425f598dab58fb66676b5ea2fcfc187a4739b6459072bec75df69cd900cd" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "4b053aa7a03eddbb0702a0c959bd6a61ad2a359f4b242340e96bdf74ad2d5dc0" } }, { "amount": 400000000000, "target": { "key": "fa397b1afbc030ae4855223c3399c9f4aa3ab6f4b398d7bdf93a4bebcac5b064" } }, { "amount": 1000000000000, "target": { "key": "3cf759eaefc9b17031a80c0e5cf42bb668045fbb1a23fc4c30aabd18a5278cb0" } }, { "amount": 9000000000000, "target": { "key": "189decb381a8bbe758d81eb78ff60fdcffef0c35d6b512995521758bbb2fd668" } }, { "amount": 90000000000000, "target": { "key": "e27fd8adaa79b1e33eec20798a0b723b0b9b2cc94333156cef316693e5cdbc07" } }, { "amount": 900000000000000, "target": { "key": "13294fa044c348a8a1eea2d27b433fe86f78d9dab5edd9e946d54f51ade50c5b" } }, { "amount": 1000000000000000, "target": { "key": "d0fe01a7e25e572af569a3ebb9ef53dad70c8d8dc285313f1258b13fa79f0b68" } } ], "extra": [ 2, 33, 0, 241, 71, 189, 111, 92, 199, 51, 89, 230, 255, 14, 151, 84, 116, 12, 67, 208, 168, 253, 108, 161, 223, 20, 254, 24, 113, 17, 156, 140, 142, 104, 130, 1, 174, 76, 158, 156, 65, 89, 248, 82, 164, 131, 81, 63, 204, 71, 48, 201, 127, 49, 120, 229, 117, 195, 125, 27, 52, 237, 69, 27, 47, 168, 110, 168 ], "signatures": [ "a7bcb7b502d0edf76497eed894d30a39ec1b47b402fcf3f2b64a810c5eb0ef097185d637e0fe53e8730d0722b2eb0f6bc89235ddc2bfb3f6d5881e73f6eb6008", "0f73a5701904d8cb0c057700ea11f1f572b797d2f6bd58ea853c1bd19a4ec108d8664af2cceefb0c36e59c867d5bcd940d5bd25b81a1145cc9d6bb73c823e80a", "f6c79fb6348a05d142845767b10c37cf0bd6418ba5b05dc55a470b4f26100d084dcca09bac0fbf8c498c8809b97920e6dd968eda2634a4542bb6d1298b39e90e"] }


Less details
source code | moneroexplorer