Monero Transaction 06babd4709af0aea09523f25fad0e38b51962c476815560e5950d9e397f03a97

Autorefresh is OFF

Tx hash: 06babd4709af0aea09523f25fad0e38b51962c476815560e5950d9e397f03a97

Tx prefix hash: 93b54b3762138259fdb9bd2c94dad8ceec71bc5f21e9d3cffdcdbb5d20cde5b6
Tx public key: 87b3323bb8be8faf0a8c31cc7aa6d956e549fdb874eb1aab00f36aee63fb4244
Payment id: 1b9b2fecc710addff47d266aba515a775128115d87d24b24fa1118cc21d8c5f2

Transaction 06babd4709af0aea09523f25fad0e38b51962c476815560e5950d9e397f03a97 was carried out on the Monero network on 2014-10-03 09:12:40. The transaction has 3045475 confirmations. Total output fee is 0.180217005267 XMR.

Timestamp: 1412327560 Timestamp [UTC]: 2014-10-03 09:12:40 Age [y:d:h:m:s]: 10:057:08:23:36
Block: 244497 Fee (per_kB): 0.180217005267 (0.194254961467) Tx size: 0.9277 kB
Tx version: 1 No of confirmations: 3045475 RingCT/type: no
Extra: 0221001b9b2fecc710addff47d266aba515a775128115d87d24b24fa1118cc21d8c5f20187b3323bb8be8faf0a8c31cc7aa6d956e549fdb874eb1aab00f36aee63fb4244

6 output(s) for total of 17.712000550000 xmr

stealth address amount amount idx tag
00: 8c582b00e228643baaf9883147b856f732942528c31fe703f09fb1bdbd7b6184 0.012000550000 0 of 2 -
01: 50967532230fb89cda29187ccc59befd48d3312477ccf01aeffdecd5973ab8cd 0.200000000000 540772 of 1272210 -
02: d79a33d9adae90b46710cb7faeb20382342b31babb2871a0f884947d12e49670 0.500000000000 356380 of 1118624 -
03: b21bbde149d3f3549600ce2e7e37fddb743e9303902e9d8c948983e26671deba 1.000000000000 288138 of 874629 -
04: a9a058ca413f134e1bcb3cba2efe8c6c5d8b3657d1f96e7908c2293418b89b5f 6.000000000000 83719 of 207703 -
05: ec9f1d8718e51c7e92a3f2d151415b45ec247519e0ca2a53565c2991ff42afd5 10.000000000000 284673 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-09-21 13:35:52 till 2014-10-03 06:18:40; resolution: 0.07 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |______________________________________________________________________________________________________________________________________________________________________*___|
  • |______________________________________________________________________________________________________________________________________________________________________*___|
  • |________________________________________________________________________________________________________________________________________________________________________*_|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_______________________________________________________________________________________________________________________________________________________________________*__|

6 inputs(s) for total of 17.892217555267 xmr

key image 00: c9bb36742f1ed4bb383d92533d51aedf60e7c02ae593bbf0992ec554bd64ab9b amount: 0.092217555267
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 805f90074b331a83caf294c98b1aaf41d758d2e2bd39ae8aedd50a05e1eead44 00227684 0 0/4 2014-09-21 14:35:52 10:069:03:00:24
key image 01: ac2342a014fb36ba6208d8021bd15c77600182e5eb7bbb838b82d5378b540359 amount: 6.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0650100c64b60d4ad9dbf9041fe2c222a8ae13f3f24bf8bf1a6188303df97f35 00243909 1 3/6 2014-10-03 00:12:35 10:057:17:23:41
key image 02: ce4337942448d5fe6b42d9f7d1a5760eaecc61f0ec0a8274ca0ff2c378ac8710 amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4e965637358870a471ed38ad0ba4239f47328b80a012c8684185c67cfcbbcf04 00243970 0 0/4 2014-10-03 01:19:22 10:057:16:16:54
key image 03: 753a8c220291b2b92967409e7303ef7819206d3a158d308fab69f9cee082d57e amount: 0.800000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7a3995897aa049f92e9d47ab96cd3525b78be56bdf92c35f60cea763828e2fdc 00244171 1 4/4 2014-10-03 04:33:28 10:057:13:02:48
key image 04: 6a11e6b9a759b0648e7d3a1e66571d86dc668913fc83c73f6192a4c9a129fa92 amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 837c86cca57e9e02153d3f0cfef7d2c46795fb0bff02be60c2577bb05673dc52 00244219 0 0/4 2014-10-03 05:18:40 10:057:12:17:36
key image 05: 3be26418c3d9b3049a8f8d219653c84e10e61f5dd8abfc582be439d0cc493c1e amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 46a04673b93569780b10c8a5c03d35e3b91dd6df135c846af3e8eae21ec46ce2 00244021 1 7/100 2014-10-03 02:19:23 10:057:15:16:53
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 92217555267, "key_offsets": [ 0 ], "k_image": "c9bb36742f1ed4bb383d92533d51aedf60e7c02ae593bbf0992ec554bd64ab9b" } }, { "key": { "amount": 6000000000000, "key_offsets": [ 83679 ], "k_image": "ac2342a014fb36ba6208d8021bd15c77600182e5eb7bbb838b82d5378b540359" } }, { "key": { "amount": 3000000000000, "key_offsets": [ 67963 ], "k_image": "ce4337942448d5fe6b42d9f7d1a5760eaecc61f0ec0a8274ca0ff2c378ac8710" } }, { "key": { "amount": 800000000000, "key_offsets": [ 168379 ], "k_image": "753a8c220291b2b92967409e7303ef7819206d3a158d308fab69f9cee082d57e" } }, { "key": { "amount": 3000000000000, "key_offsets": [ 68195 ], "k_image": "6a11e6b9a759b0648e7d3a1e66571d86dc668913fc83c73f6192a4c9a129fa92" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 116753 ], "k_image": "3be26418c3d9b3049a8f8d219653c84e10e61f5dd8abfc582be439d0cc493c1e" } } ], "vout": [ { "amount": 12000550000, "target": { "key": "8c582b00e228643baaf9883147b856f732942528c31fe703f09fb1bdbd7b6184" } }, { "amount": 200000000000, "target": { "key": "50967532230fb89cda29187ccc59befd48d3312477ccf01aeffdecd5973ab8cd" } }, { "amount": 500000000000, "target": { "key": "d79a33d9adae90b46710cb7faeb20382342b31babb2871a0f884947d12e49670" } }, { "amount": 1000000000000, "target": { "key": "b21bbde149d3f3549600ce2e7e37fddb743e9303902e9d8c948983e26671deba" } }, { "amount": 6000000000000, "target": { "key": "a9a058ca413f134e1bcb3cba2efe8c6c5d8b3657d1f96e7908c2293418b89b5f" } }, { "amount": 10000000000000, "target": { "key": "ec9f1d8718e51c7e92a3f2d151415b45ec247519e0ca2a53565c2991ff42afd5" } } ], "extra": [ 2, 33, 0, 27, 155, 47, 236, 199, 16, 173, 223, 244, 125, 38, 106, 186, 81, 90, 119, 81, 40, 17, 93, 135, 210, 75, 36, 250, 17, 24, 204, 33, 216, 197, 242, 1, 135, 179, 50, 59, 184, 190, 143, 175, 10, 140, 49, 204, 122, 166, 217, 86, 229, 73, 253, 184, 116, 235, 26, 171, 0, 243, 106, 238, 99, 251, 66, 68 ], "signatures": [ "888f8786b6627ed71150b7805f0e5c3584c48722294696dcb02377503d6c430854ac0a90585ba292f0171cf150e8fd887f3b15824ac8b3ec6ad07d339f48610f", "375367aa217e8755fb61251e9b6828ea024ec8752d48aa18be8854acac2bc80f38721af7f745ad8ad13071b10148e43ae917f5c4d0b61d810077ffeb4badfd09", "40d8f99526c00dd2eb20f21f8081e993b7abd3b975953317e4accc3898279607046de0a844523b52b45239df1c18cb21a80f429e0265ff6f7d1b4bea3c8d4206", "9fea496bcc9a5cb24084c268cad54bb647b36fdc7c336cbf1a5f485b72f32a073d67886d5c2a415f5718aeec710aa5fc990e56399abcd20336b43d6bbac1b00a", "5a3c75798edf53082fc105f07529a1a4005c4f4690a45689a78caf6e2fe7630bc0c557366d7fb66d1abb937c982690fbee40b4b7eb8eb26fd3f301de94c9570b", "e3a4c186d07503b6b391735573603c98ddc17a30aac21a7f64a79b218551290ad481e802c3a7202c5d554e1ce21001dc3034e4dea204673fc9b2ae64d048b104"] }


Less details
source code | moneroexplorer