Monero Transaction 6a330bece72b6d5159564e95a66c4b00db748ed5daafa38535f4f9d15d9f6234

Autorefresh is OFF

Tx hash: 6a330bece72b6d5159564e95a66c4b00db748ed5daafa38535f4f9d15d9f6234

Tx public key: 130bb7fb9e84f95a990b0013540f4de170acea113d2e0b2e29766e1615ffa2a8
Payment id: 8fd7bf5fd858481a961fe21fe76fce40d792b1d7412d4f3596920b1c5dc7ccf0

Transaction 6a330bece72b6d5159564e95a66c4b00db748ed5daafa38535f4f9d15d9f6234 was carried out on the Monero network on 2014-11-12 17:29:23. The transaction has 3006478 confirmations. Total output fee is 0.158889797494 XMR.

Timestamp: 1415813363 Timestamp [UTC]: 2014-11-12 17:29:23 Age [y:d:h:m:s]: 10:042:17:42:16
Block: 302014 Fee (per_kB): 0.158889797494 (0.310502199683) Tx size: 0.5117 kB
Tx version: 1 No of confirmations: 3006478 RingCT/type: no
Extra: 0221008fd7bf5fd858481a961fe21fe76fce40d792b1d7412d4f3596920b1c5dc7ccf001130bb7fb9e84f95a990b0013540f4de170acea113d2e0b2e29766e1615ffa2a8

6 output(s) for total of 15.841110202506 xmr

stealth address amount amount idx tag
00: bcd28d137e40aec100d4832cddb11c9d88943f70f8770fb3febaef3f8553ab11 0.041110202506 0 of 1 -
01: 57329577da796b9f50857064a3140f99aa818688a02a4519fe9980eb8b7e30e3 0.900000000000 158053 of 454894 -
02: 96a61943bfcf79b7414caddba774cc583fadc54249ee97402389bff194fe5532 0.900000000000 158054 of 454894 -
03: 55cff5efc729cc4e713d25a91994508b0a333f8f4995efb7a820d1e91a945e1b 1.000000000000 333485 of 874630 -
04: 86cda1eb44a54275eb97fe6d283ceebb0500b281e708ea74cec716ff2a15526b 3.000000000000 133279 of 300495 -
05: 297c539cce81d72a63598db459fce4336bb2f56686b53bb0980e828f04190d22 10.000000000000 351128 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 16.000000000000 xmr

key image 00: 01376dbebb600da66e3993b2dfbf70d931361a871bf3874027bbcba19c57d77e amount: 6.000000000000
ring members blk
- 00: 695981a94860cb511861d0b7ca21b4218e901b11d731106cdcf2556489dc7333 00301964
key image 01: 060d78904f7362a3f0b50e861db05e1d053576d5910213e2aef446522e9e1942 amount: 10.000000000000
ring members blk
- 00: b897fafee37a0059db7d5814b5e85bc3d784c35ef89f1134972627378ea8039f 00299672
More details
source code | moneroexplorer