Monero Transaction 06a669a205170154b9ce2dd5fc7b16b2633bba5e333da9851ee266bd989a982d

Autorefresh is OFF

Tx hash: 06a669a205170154b9ce2dd5fc7b16b2633bba5e333da9851ee266bd989a982d

Tx prefix hash: 1962a679022a31e3f86e82c802dce9a57b4f1554ef45ef3b6a6ac635713bb8e5
Tx public key: 540e0efa974fbd99c0a0fb90184f942cc64935f9e35e3286eeb7e0cae63255e1
Payment id: 476ee59d59c509950192e65c230883622c05dbe4d9516482b5e3794e0fd0d87c

Transaction 06a669a205170154b9ce2dd5fc7b16b2633bba5e333da9851ee266bd989a982d was carried out on the Monero network on 2016-11-04 09:38:52. The transaction has 2123804 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1478252332 Timestamp [UTC]: 2016-11-04 09:38:52 Age [y:d:h:m:s]: 08:032:15:46:14
Block: 1172164 Fee (per_kB): 0.010000000000 (0.015975039002) Tx size: 0.6260 kB
Tx version: 1 No of confirmations: 2123804 RingCT/type: no
Extra: 022100476ee59d59c509950192e65c230883622c05dbe4d9516482b5e3794e0fd0d87c01540e0efa974fbd99c0a0fb90184f942cc64935f9e35e3286eeb7e0cae63255e1

5 output(s) for total of 99.990000000000 xmr

stealth address amount amount idx tag
00: 30457737ed58f820021ffd654394735753cfe9eacdc66b4f50b4beb4298a8224 0.090000000000 275350 of 317822 -
01: b73a82c7237105e7b470ef6c63f827de55c2c6df40a03ba2a99fb03418d476e9 0.900000000000 419807 of 454894 -
02: d5203383f6c8113780ade5095f06ca114e24ca0cafc4336bf5499ddacf4384a1 3.000000000000 282720 of 300495 -
03: ac1d8a58e3f6cde79e6b7fb6afe8e60f6a020e8d0694cf7589a976c7fd6d0bca 6.000000000000 194740 of 207703 -
04: 8002031eb97a133315427377c27204c7e32c6e6cb8a69936616c30f7e2ebb7e2 90.000000000000 30488 of 36286 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-03-14 02:23:57 till 2016-11-04 09:23:09; resolution: 3.54 days)

  • |_*________________________________________________________________________________*__________________*_______________________________________________*___________________*|

1 inputs(s) for total of 100.000000000000 xmr

key image 00: caf0b7a34bc6f84100613a99cdf914bf6259105bd5665af118dabf055c3744a3 amount: 100.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c9d9c294ff27807ba4c1bfe85a13eb60836de37c822ab98304a29721b2ec2f39 00475473 1 2/10 2015-03-14 03:23:57 09:268:22:01:09
- 01: 0395d54c7b4bdf4f7632f6fac33ff474c4a6b9a82c26f5e33fc603abc74d74df 00889136 1 13/8 2015-12-29 09:13:09 08:343:16:11:57
- 02: ad67d86714c26a67f0597f998b9bad6178fb06b9403e5a9d18cfd6895ec5212f 00986752 1 38/1 2016-03-07 09:10:34 08:274:16:14:32
- 03: 788a4ae44604e632edfa7d83ec0c7f61671a0167d28572001f23ce2fa7173d3d 01119243 3 1/6 2016-08-22 16:49:53 08:106:08:35:13
- 04: d73d57fa82a5f06eef3e354743d7085e5b4384a26e7398c2af4ada978b8edc00 01172125 3 17/6 2016-11-04 08:23:09 08:032:17:01:57
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 100000000000000, "key_offsets": [ 13019, 12633, 4569, 9861, 9510 ], "k_image": "caf0b7a34bc6f84100613a99cdf914bf6259105bd5665af118dabf055c3744a3" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "30457737ed58f820021ffd654394735753cfe9eacdc66b4f50b4beb4298a8224" } }, { "amount": 900000000000, "target": { "key": "b73a82c7237105e7b470ef6c63f827de55c2c6df40a03ba2a99fb03418d476e9" } }, { "amount": 3000000000000, "target": { "key": "d5203383f6c8113780ade5095f06ca114e24ca0cafc4336bf5499ddacf4384a1" } }, { "amount": 6000000000000, "target": { "key": "ac1d8a58e3f6cde79e6b7fb6afe8e60f6a020e8d0694cf7589a976c7fd6d0bca" } }, { "amount": 90000000000000, "target": { "key": "8002031eb97a133315427377c27204c7e32c6e6cb8a69936616c30f7e2ebb7e2" } } ], "extra": [ 2, 33, 0, 71, 110, 229, 157, 89, 197, 9, 149, 1, 146, 230, 92, 35, 8, 131, 98, 44, 5, 219, 228, 217, 81, 100, 130, 181, 227, 121, 78, 15, 208, 216, 124, 1, 84, 14, 14, 250, 151, 79, 189, 153, 192, 160, 251, 144, 24, 79, 148, 44, 198, 73, 53, 249, 227, 94, 50, 134, 238, 183, 224, 202, 230, 50, 85, 225 ], "signatures": [ "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"] }


Less details
source code | moneroexplorer