Monero Transaction 6801f8ffebe8054ba705716d9e75ed05ed6e017d80d0241cc9a56662319c8757

Autorefresh is OFF

Tx hash: 6801f8ffebe8054ba705716d9e75ed05ed6e017d80d0241cc9a56662319c8757

Tx prefix hash: 06bb6f5b321e0dedd54c33d263b2e2d64b752de8b0cc914f9000d607bdfef00b
Tx public key: b10c6aa7f9c489e2097f3861dfa373d55dd7efb9c244afec58856807ae2623c4

Transaction 6801f8ffebe8054ba705716d9e75ed05ed6e017d80d0241cc9a56662319c8757 was carried out on the Monero network on 2014-06-04 21:44:07. The transaction has 3209175 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1401918247 Timestamp [UTC]: 2014-06-04 21:44:07 Age [y:d:h:m:s]: 10:164:06:36:10
Block: 71014 Fee (per_kB): 0.005000000000 (0.015753846154) Tx size: 0.3174 kB
Tx version: 1 No of confirmations: 3209175 RingCT/type: no
Extra: 01b10c6aa7f9c489e2097f3861dfa373d55dd7efb9c244afec58856807ae2623c4

2 output(s) for total of 0.009460000000 xmr

stealth address amount amount idx tag
00: 8a53e693f96e9587d1bd0fc077ae474b9fdb1577dc78bfcc8d3be40641675c71 0.000460000000 780 of 2128 -
01: 3b1f503d747b65a59205148fd56e6dcf6bfe577342bb7cf170b6989cfc5c5500 0.009000000000 40200 of 233398 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-04 20:34:27 till 2014-06-04 22:34:27; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|

2 inputs(s) for total of 0.014460000000 xmr

key image 00: b9a4cf82ecd1f7b5130c5ccea499b335c7d361d6a909a7187e1bdd57ce0255d4 amount: 0.004460000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8a6ad62dbfc08d8d9990e3ac6cbb5b355bc686c8736208915f230ba59f3193bf 00071003 1 4/33 2014-06-04 21:34:27 10:164:06:45:50
key image 01: fb681920180e0a5a3b3cc2e6d7814b959321abac13120b15db8a754819cd99ae amount: 0.010000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a4a1964f2b07afd696ac08b917cdb36b7eaf9eed16dc6c959c00486148b5867c 00071003 1 4/33 2014-06-04 21:34:27 10:164:06:45:50
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 4460000000, "key_offsets": [ 144 ], "k_image": "b9a4cf82ecd1f7b5130c5ccea499b335c7d361d6a909a7187e1bdd57ce0255d4" } }, { "key": { "amount": 10000000000, "key_offsets": [ 83382 ], "k_image": "fb681920180e0a5a3b3cc2e6d7814b959321abac13120b15db8a754819cd99ae" } } ], "vout": [ { "amount": 460000000, "target": { "key": "8a53e693f96e9587d1bd0fc077ae474b9fdb1577dc78bfcc8d3be40641675c71" } }, { "amount": 9000000000, "target": { "key": "3b1f503d747b65a59205148fd56e6dcf6bfe577342bb7cf170b6989cfc5c5500" } } ], "extra": [ 1, 177, 12, 106, 167, 249, 196, 137, 226, 9, 127, 56, 97, 223, 163, 115, 213, 93, 215, 239, 185, 194, 68, 175, 236, 88, 133, 104, 7, 174, 38, 35, 196 ], "signatures": [ "2d662377f286c4a1244ab03b897e4eb334b6e5e39032ca49cefd55d27425d3045361370e8194cbd1f8824808913e5d1fab84ce64d2048d5018ee970a4ffa2200", "3892dae434df14e809cd7c08a0152023395464a58b0467ab02dcffee7f84bb0e71c9ae5cb45d482dd187fe37e5ad597f4b7b80a4f3f64d1086e4d18dd2627700"] }


Less details
source code | moneroexplorer