Monero Transaction 2c06fcfe401e0299424b666f96aa6a36958463c8b754a47a7311241e3f9c8fae

Autorefresh is OFF

Tx hash: 2c06fcfe401e0299424b666f96aa6a36958463c8b754a47a7311241e3f9c8fae

Tx public key: c9e832acdb5f8f7696c262bd440af561d101cdc9bde38e83a51eaee7a6f6858d
Payment id: 6d3bcd8cff17164168ac1e38d573190d193acddfc0c22db49313257f74a6978b

Transaction 2c06fcfe401e0299424b666f96aa6a36958463c8b754a47a7311241e3f9c8fae was carried out on the Monero network on 2014-05-29 12:40:34. The transaction has 3233912 confirmations. Total output fee is 0.000001000000 XMR.

Timestamp: 1401367234 Timestamp [UTC]: 2014-05-29 12:40:34 Age [y:d:h:m:s]: 10:192:00:41:14
Block: 61757 Fee (per_kB): 0.000001000000 (0.000000764750) Tx size: 1.3076 kB
Tx version: 1 No of confirmations: 3233912 RingCT/type: no
Extra: 0221006d3bcd8cff17164168ac1e38d573190d193acddfc0c22db49313257f74a6978b01c9e832acdb5f8f7696c262bd440af561d101cdc9bde38e83a51eaee7a6f6858d

6 output(s) for total of 0.081975861648 xmr

stealth address amount amount idx tag
00: b3737567a3e5efb19260b39ed11fbbf2b38afa4f3a1dc02fb29e953a2c66b3b4 0.000000861648 0 of 1 -
01: 0e640119912b123b4e59621268d6ddd706f0a14801a2979018f95337f915d8fe 0.000005000000 11643 of 42488 -
02: 7bbf56c7b88a2c7a59f7d13bf02ca0a073e15c44203e196aaee2e70dbb6f6277 0.000070000000 26403 of 59071 -
03: 43049917c96833e873e28bf3c4b45c53b98a0747be5eec31dee78b17a505a912 0.000900000000 26443 of 81915 -
04: 2a0fa7634a7c86e9d6ef1446da9e3e204694e57d51bcd970963d0f00427d0ec1 0.001000000000 34926 of 100400 -
05: 1b5dab8380ad30f75008b3f5d57cb5d84fc0660bacc7ceff14155b642e3d79c2 0.080000000000 13184 of 269576 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



10 inputs(s) for total of 0.081976861648 xmr

key image 00: 6703656ae6fd92ce5c2b634257d78b181cc5e06e843b6176e11488f827a86ffb amount: 0.000000344599
ring members blk
- 00: eeadc83496a382a44943a294e2429eff635d276e645ea4c448e50d473c378201 00051832
key image 01: 41f4b865e624383dee8953071eb4928f7f6c39117424cae01d94f5a1d7cd1606 amount: 0.000004000000
ring members blk
- 00: 6a9b055062e1d9fac20e6b1a7701ca46d8750b5862c08a93fa0e44f50235137c 00051832
key image 02: 2fc0e1aa18227744de6dfd46e8150176fd1e9bfbc6a1fe7f39ed3943cf5bf470 amount: 0.009000000000
ring members blk
- 00: 0f2af7a1b10c01870bcb5385b2723c1fa173b83f36f3aceac598f886da28917d 00051832
key image 03: 30a9d6e2fe1efd0ddcf059e934fc5e4b68ef3f107dcb91cb57cb2ab9ab4771ec amount: 0.000002000000
ring members blk
- 00: 68181b0f76936fca0c92bbeeebea27ac38013ed625222f4c8599683bae9a22a2 00051791
key image 04: 519a0d74d6c9ba52a660af35ff1d862a8fa48a6c83421ab6baa73825161ad9c1 amount: 0.020000000000
ring members blk
- 00: 21fe88ed4e4e07d0d9c2d0adba88ce2faa605e1ef7794eb9d39d8a826fd21a0d 00051832
key image 05: 8cfb3d154a6ce4195ece0f6fd7c138851762328ebd0945f98a02588c87ba7b24 amount: 0.000070000000
ring members blk
- 00: 520e0488f952a2f24a3d785b5c23ce5735cfc7216b7c787e0048f06b3031a6f4 00051791
key image 06: 4dffddb9c63aabd8c5cf1c8320a496f4e6604b6f838632e889813e47bf07d223 amount: 0.050000000000
ring members blk
- 00: 2612cd213e0b3e470049e3dcaa3605ef0984334c0749bea9ff52c1c69f699170 00051791
key image 07: 03dcafc8edb12f6f26503ebe1caeb5edc847491060d28821923e87970e07ec32 amount: 0.000900000000
ring members blk
- 00: 20e9384c11c20c96c6325b1d0e48ca745a5e95986d74cf4182ed6a5b92a47381 00051791
key image 08: b2907cf6848549a3a0dae607d41e86437d39f8c981b5cec55b87a14ca1460733 amount: 0.002000000000
ring members blk
- 00: dd986cad0ee2170b97fbaa95d7f9470ed52b9c3710ae38740bc1671bd186950b 00051791
key image 09: bb0350c71df54df6221789a8707d21b432b86834ac26ea656e2848135b8c16b2 amount: 0.000000517049
ring members blk
- 00: d5f2e9f75bd207c77c580685b00a4e7f04cade40ff1dae57c36476e29f083bfe 00051791
More details
source code | moneroexplorer