Monero Transaction 6aa72877d9069fb2fccb2e5c352afd92aff24ab4181cc9a03bcba826272431f6

Autorefresh is OFF

Tx hash: 6aa72877d9069fb2fccb2e5c352afd92aff24ab4181cc9a03bcba826272431f6

Tx public key: c20e5206954d6d6fe6d7bf90aa78eb96a0779cd8c8cb087b8877ffb7ce5fd5d1
Payment id: 0629271b98cd971e9c1065c05bb37a9906989fe41a43878d89d2880611723a2c

Transaction 6aa72877d9069fb2fccb2e5c352afd92aff24ab4181cc9a03bcba826272431f6 was carried out on the Monero network on 2014-08-30 09:53:26. The transaction has 3099896 confirmations. Total output fee is 0.168645453939 XMR.

Timestamp: 1409392406 Timestamp [UTC]: 2014-08-30 09:53:26 Age [y:d:h:m:s]: 10:099:07:57:58
Block: 195888 Fee (per_kB): 0.168645453939 (0.416127577912) Tx size: 0.4053 kB
Tx version: 1 No of confirmations: 3099896 RingCT/type: no
Extra: 0221000629271b98cd971e9c1065c05bb37a9906989fe41a43878d89d2880611723a2c01c20e5206954d6d6fe6d7bf90aa78eb96a0779cd8c8cb087b8877ffb7ce5fd5d1

6 output(s) for total of 19.831354546061 xmr

stealth address amount amount idx tag
00: b6cebb4addd1593829da8004614c755b956ec23ee2c6b2620ca7d0aeb550cac0 0.031354546061 0 of 1 -
01: 042fdd742bbff003be740038bd4797298e26cdaca0007b38ea40271ca8ca12a4 0.200000000000 420739 of 1272210 -
02: e6dbf4a6bfd2f91ad56d22327843b2a0a6ca4e16be47c2e84abc93280757a2d3 0.600000000000 178502 of 650760 -
03: 09e3c39473f70bb1263e266e8a685677765af7b4c7fd012a001edc4b1bdae79b 4.000000000000 66873 of 237197 -
04: 0699965fd386a22018af160ee80bba7b43b9d8bea57e160c3b8b74be53f2df10 5.000000000000 109576 of 255089 -
05: 47314290200b2c1c96bd7896a8502fe17aaac2469e8f752efc1496a2f3e5683a 10.000000000000 226520 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



1 inputs(s) for total of 20.000000000000 xmr

key image 00: 527691b2b2ea7f2143c0546a70b3fc47b7382f0fb3a6fb14dec195f4cb2aede9 amount: 20.000000000000
ring members blk
- 00: 93a8f315f2971b28241e581a2ad0a40c63cfa7c3edff0350577f80ba4340655b 00195760
More details
source code | moneroexplorer