Monero Transaction 6a9fb6926717975172eb9d5152b66958c6c65c8d8a1ff60af20ab41a6534ce14

Autorefresh is OFF

Tx hash: 6a9fb6926717975172eb9d5152b66958c6c65c8d8a1ff60af20ab41a6534ce14

Tx public key: 0b2cb0063cba65a014bad9d1b00409ae707b4d1a89f1ead99c423944ec31d205
Payment id: d95b0eb8f992857ddc53060224c362804b6ab8b6f0414147530153545b7a8b9c

Transaction 6a9fb6926717975172eb9d5152b66958c6c65c8d8a1ff60af20ab41a6534ce14 was carried out on the Monero network on 2014-05-20 18:54:23. The transaction has 3229495 confirmations. Total output fee is 0.000001000000 XMR.

Timestamp: 1400612063 Timestamp [UTC]: 2014-05-20 18:54:23 Age [y:d:h:m:s]: 10:176:21:28:40
Block: 48951 Fee (per_kB): 0.000001000000 (0.000001848375) Tx size: 0.5410 kB
Tx version: 1 No of confirmations: 3229495 RingCT/type: no
Extra: 022100d95b0eb8f992857ddc53060224c362804b6ab8b6f0414147530153545b7a8b9c010b2cb0063cba65a014bad9d1b00409ae707b4d1a89f1ead99c423944ec31d205

7 output(s) for total of 80.069999000000 xmr

stealth address amount amount idx tag
00: 32465c79f192573a78c3a95e41129de00fa77abe9fb921a7dcd6775cd695cd05 0.000009000000 6136 of 46395 -
01: 9aeced0d08d602316339351de715b5e7685c0163654a0abaf423524f17adc26a 0.000090000000 6019 of 61123 -
02: f3498d964a1e8cdb3fb1479757247c3a9830756a397efdc7a2b82a1e1f43f818 0.000900000000 6058 of 81915 -
03: 8e2f1e1fc97ab989861c9983c6794ba2afd80594ab1a35eab7e77828b29cbf98 0.009000000000 5939 of 233398 -
04: 561d28272534cfbae4e5359822ddf362047308ce3cc887cb81c7ef94cd9e2ad3 0.060000000000 5534 of 264760 -
05: c0978f6351343671f17319cf2ab8231b14b831c58a4668f81165b6bfe71c74fd 10.000000000000 48872 of 921411 -
06: 834921589c8a07955d306b68818a45cadfd75335ef42a48976981d3bca3ffe31 70.000000000000 80 of 24819 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 80.070000000000 xmr

key image 00: 2e595bc007d2bd9dde294bdd12ee1e152fe984821cd952186a6a9c2177ddb137 amount: 0.070000000000
ring members blk
- 00: b974149ccff5cd1a119c832f18ffb3da42a0aee82da21499cccd27f2c4f36a9a 00023739
key image 01: 21c44a42f551c9249b16117b6326a1814a8d9ad31b753c462bba071e3a118e1d amount: 80.000000000000
ring members blk
- 00: 13a19b93f1e6084a4c373aab567bba254274816eff9fc176b15dfb46494d7d7f 00035517
More details
source code | moneroexplorer