Monero Transaction 6a134f46c852074f6e30bc80e0ea0635636d5227d480b25af8fc4f8b5f9b7436

Autorefresh is OFF

Tx hash: 6a134f46c852074f6e30bc80e0ea0635636d5227d480b25af8fc4f8b5f9b7436

Tx public key: 469b745aaea2a9c33912e0762abb01bd6fe651041349227c6af180280c60a71d
Payment id (encrypted): afccdda57b0ade6f

Transaction 6a134f46c852074f6e30bc80e0ea0635636d5227d480b25af8fc4f8b5f9b7436 was carried out on the Monero network on 2020-10-10 14:38:16. The transaction has 1087648 confirmations. Total output fee is 0.000023920000 XMR.

Timestamp: 1602340696 Timestamp [UTC]: 2020-10-10 14:38:16 Age [y:d:h:m:s]: 04:052:04:59:11
Block: 2205312 Fee (per_kB): 0.000023920000 (0.000009417178) Tx size: 2.5400 kB
Tx version: 2 No of confirmations: 1087648 RingCT/type: yes/4
Extra: 01469b745aaea2a9c33912e0762abb01bd6fe651041349227c6af180280c60a71d020901afccdda57b0ade6f

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: 4ef4e1da715a39719502aa829970c562bfe1544e6a1f25fe24164030ac8df903 ? 21675076 of 120549171 -
01: 4524dd2a03cb73b39624b3127b4b5de460a8962498e9ccf84164abfdff95350b ? 21675077 of 120549171 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 input(s) for total of ? xmr

key image 00: 80844c8a0cf2f644d8ff1c523365a75cfc3d3236f1dcbdba6a05611b906e0aa8 amount: ?
ring members blk
- 00: e11aba5852fa198264699ddf8a068a769e62aed13a17e22b9f6efd3ef2c114ec 02197831
- 01: a6654b30b1308165e466395177334051e225bb25fbe1909601b49b4b2964054c 02202620
- 02: 9acde16f95f0a67fdbc8f4ed222519b79e90ad29e0229624560699e8eb33831f 02203900
- 03: a74a9411fee4b2e6f62ed8939aa4250df466388a13426e5b36d5d14e70497726 02203999
- 04: 4277416d27b306353676ead4af44e64345cb4aa62cfdc022054c92983fbd3cca 02204109
- 05: 391bd5298ab00ab7693dea15838e7afcda49e2ec831017b4fdda740587f7e77b 02204619
- 06: 4db646f327ac6484485610efb85d5b584cf1baa2cfae56eb2f1687f1be1bbf0e 02205024
- 07: 19fdf96182466e2e4918904ab015ce5d76abf28019cee3abe74760831eea4ae4 02205272
- 08: ba06608014648b8627fbaed9f384d1acd9e9229c42ae4aefe0200c1539ff5956 02205272
- 09: 881497f6abb982ffbc275db45957c2b9dc9c7cb8678079a5c1db9ab6e7382222 02205272
- 10: a05b5ba1e9b0fe5d6948a0be46a32d185d14255850d0aabdb567c2d05f7f0277 02205283
key image 01: 0e3107c0912f0623b61745f0da210ebb7aaba7a33ffc4aac4a25274cfdaffae6 amount: ?
ring members blk
- 00: 354eab0a4370ae209e15ab975fa66a01353d6f4bc1fcc448676298467abdb37b 02034091
- 01: 82eaf0694c2e12aab0c725aa2c6fcb90aadddb359615710614144d62483630b3 02203196
- 02: 05ec2597c3f4e01dcdb07736675a9f48d5a21202c0cd5252e10127ba0b92335b 02204506
- 03: fe8808936a0cdefda0b03bfa5e5809dfbbb88d21eb9fe4503b680ee2530f90e7 02204791
- 04: 91ed1fcc85b3c8fe7126a1372f6de7f0ef41f3666572dcfef6fb4c0ef6e091e0 02204842
- 05: e5faa67234802fd5d06cf0ffecc37a084fc7e1009a7267066c2eb21ee4b20bfb 02204954
- 06: 8469012fb92e2914c1070d3a502a8e9aba118197a5448774f5cc97bf3cb8b33b 02205072
- 07: 8b8541aa08fa14448380587020460bc7d6c256345ffbb02e09a8484fe75c5b0e 02205128
- 08: 374cf7c18c73f39104a14ba21ce00d52432a7809c9cafe120fc5a7c50b4d039a 02205202
- 09: dc512af04aa01d16743661e17f7dfff92ab66bebd48af5beecaed5a74a4cc03f 02205272
- 10: b0ac2ed7f9ea5febd1d47e086dcd49e34191e1253f53a812259be3babbab6015 02205272
More details
source code | moneroexplorer