Monero Transaction 6aaffc47d74def32869f66b3f3780b55f25fd78a5baa4ed5d279e07bb485d71c

Autorefresh is OFF

Tx hash: 6aaffc47d74def32869f66b3f3780b55f25fd78a5baa4ed5d279e07bb485d71c

Tx prefix hash: b4dfe5900093acde0b9850f57adb37f0e766ede328d9f7b0c1e4ad8c1a002542
Tx public key: a9b43d79f60dcfd9ac70589f63a869bb20b1d318616e2351d81702b908c034d0

Transaction 6aaffc47d74def32869f66b3f3780b55f25fd78a5baa4ed5d279e07bb485d71c was carried out on the Monero network on 2016-06-11 03:53:15. The transaction has 2236041 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1465617195 Timestamp [UTC]: 2016-06-11 03:53:15 Age [y:d:h:m:s]: 08:188:17:01:43
Block: 1066934 Fee (per_kB): 0.100000000000 (0.135092348285) Tx size: 0.7402 kB
Tx version: 1 No of confirmations: 2236041 RingCT/type: no
Extra: 01a9b43d79f60dcfd9ac70589f63a869bb20b1d318616e2351d81702b908c034d0

6 output(s) for total of 1000.800000000000 xmr

stealth address amount amount idx tag
00: 0a7f4d954a8e72c3665692736547a97d3f27f7de1b704c92d504de6441a6b22f 0.800000000000 417511 of 489955 -
01: 78f77c306c26cb49b5198934972b4d0dd1abe25944a4c4451b623aee4ea8ba09 1.000000000000 715333 of 874630 -
02: 5143fa3e2bfcc287c3e09e271c5c8dd028a961c059ff6d64d12712ea9e88484e 9.000000000000 183394 of 274259 -
03: cb565bfa2b5c79bd32efe911fd55b1fc1a6c4a0483d8ba2cea6f7dbfcda607bb 10.000000000000 778447 of 921411 -
04: 6bf2b5cee02a46e0dbbf11e36b27d026beb941fd9ab112d6471b42a1a0360002 80.000000000000 13923 of 23982 -
05: 3c87b85662f474522c8df6f5ef08f4457f2aabd104bd1c4c6cb2b2219a66420f 900.000000000000 3976 of 8187 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-10-11 21:18:18 till 2016-06-01 21:47:05; resolution: 3.52 days)

  • |_*___________________________________________________________________________________________________________*___________________________________________________________*|
  • |___________________________________________________________________________________________*__________________________________*_________________________________________*_|

2 inputs(s) for total of 1000.900000000000 xmr

key image 00: e2346e9acb22700cecb2c358224213ee3d74860c9292ed05d90f626f9f17cf44 amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7537aa94d9ad5637d733b2ac240ce4d8cc15c09b9440486af3f16df53d2a6ff2 00256738 0 0/4 2014-10-11 22:18:18 10:066:22:36:40
- 01: 2568baf303c5e0ef44985b97130db4133a40140726c49186c4f039ba2c9ef200 00806243 4 48/6 2015-10-31 17:51:51 09:047:03:03:07
- 02: 4d2fefa715b1f6b74878cabdd68f0159eb14878b95fc6dcef532dca44ab6411c 01060262 3 16/6 2016-06-01 20:47:05 08:198:00:07:53
key image 01: 63d58a2f803b8016d537275b7e7ed6e8ebaae47c1e06b4a74e951b8c56c74d5d amount: 1000.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: bf2dbdfee4a985a0c2677a42de2adf46f70b016df00489e2243d776fff1841ac 00712526 15 9/8 2015-08-26 22:19:59 09:112:22:34:59
- 01: dba10566243d021484f866f040af3bc603021c0a11958cfe85ee570baa112c80 00888572 1 70/11 2015-12-28 22:56:06 08:353:21:58:52
- 02: 9e4197bf8efb0004007e78d3b52bb6a4ee5f0496cc202b09f2e9a62f45af2751 01057366 3 47/13 2016-05-28 19:51:15 08:202:01:03:43
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 900000000000, "key_offsets": [ 143454, 158297, 67551 ], "k_image": "e2346e9acb22700cecb2c358224213ee3d74860c9292ed05d90f626f9f17cf44" } }, { "key": { "amount": 1000000000000000, "key_offsets": [ 3568, 1319, 2615 ], "k_image": "63d58a2f803b8016d537275b7e7ed6e8ebaae47c1e06b4a74e951b8c56c74d5d" } } ], "vout": [ { "amount": 800000000000, "target": { "key": "0a7f4d954a8e72c3665692736547a97d3f27f7de1b704c92d504de6441a6b22f" } }, { "amount": 1000000000000, "target": { "key": "78f77c306c26cb49b5198934972b4d0dd1abe25944a4c4451b623aee4ea8ba09" } }, { "amount": 9000000000000, "target": { "key": "5143fa3e2bfcc287c3e09e271c5c8dd028a961c059ff6d64d12712ea9e88484e" } }, { "amount": 10000000000000, "target": { "key": "cb565bfa2b5c79bd32efe911fd55b1fc1a6c4a0483d8ba2cea6f7dbfcda607bb" } }, { "amount": 80000000000000, "target": { "key": "6bf2b5cee02a46e0dbbf11e36b27d026beb941fd9ab112d6471b42a1a0360002" } }, { "amount": 900000000000000, "target": { "key": "3c87b85662f474522c8df6f5ef08f4457f2aabd104bd1c4c6cb2b2219a66420f" } } ], "extra": [ 1, 169, 180, 61, 121, 246, 13, 207, 217, 172, 112, 88, 159, 99, 168, 105, 187, 32, 177, 211, 24, 97, 110, 35, 81, 216, 23, 2, 185, 8, 192, 52, 208 ], "signatures": [ "7f036532839aa33ad39488f4f6fb685a2a833bc2491bad451a9d8a72c6e7a60ce13168ddc7bfb2305b68914f324d6dbee292a8043befaff5ac753341a5321c0d2348b003e87f07765059c1e9653bb96b9cfa4a07b62ffac5bfbb53a0d16721008663304aeaff0406374f3832f1d9546678ae437886a3a6cd3ec7a74e03d39005af773aabc01accc06b2b16a34a69d514ba067e54872c9059b65ebddc3861f20471204b6d542476644d0330bddb971e90dc0a038331c357e618d3f1caea3c8904", "ff8c93d1f54913797f3374231d1fd2b09c7e2c5328c8c8d89fb2dbbe0f56ea04e052e03f928d8a432a95d51005bdaf7eba1856c08c5146646b54c4f319970708d13e57aea4a08f00e246c48deeea72430b4834c44706240763844a4fb9df900efa07c20029ccb2c957f8b5b7249b6eae05863a92b48f8797a048a389e52bf4033156b63ccf70b0054b44166f3cdf33cc2d0227a5a4f14f6bc372844ba7f02b07c23a4dbbfcd94bbdc7658ec54b788affcd97b9155d47654a7b1bce1c41bb6e00"] }


Less details
source code | moneroexplorer