Monero Transaction 6af0541e19e501c825ab2787e88ab860e5e5273d4e654d88e6695b1023955f04

Autorefresh is OFF

Tx hash: 6af0541e19e501c825ab2787e88ab860e5e5273d4e654d88e6695b1023955f04

Tx public key: ad6d8b862e8e6644c818cf00cba7b2efb6ba123897c72bafc5b0c66888ad4487
Payment id: 14132be064d694d3ca16d0accc6c9d1a23d4ec5502b979d44fa1f5ec148a2a44

Transaction 6af0541e19e501c825ab2787e88ab860e5e5273d4e654d88e6695b1023955f04 was carried out on the Monero network on 2015-02-02 12:57:53. The transaction has 2887433 confirmations. Total output fee is 0.118874022917 XMR.

Timestamp: 1422881873 Timestamp [UTC]: 2015-02-02 12:57:53 Age [y:d:h:m:s]: 09:322:18:24:00
Block: 418763 Fee (per_kB): 0.118874022917 (0.291911269705) Tx size: 0.4072 kB
Tx version: 1 No of confirmations: 2887433 RingCT/type: no
Extra: 02210014132be064d694d3ca16d0accc6c9d1a23d4ec5502b979d44fa1f5ec148a2a4401ad6d8b862e8e6644c818cf00cba7b2efb6ba123897c72bafc5b0c66888ad4487

6 output(s) for total of 399.881125977083 xmr

stealth address amount amount idx tag
00: ec6e93b6c01dda8f95e2f08929bfa728498de53e6edb06a37ff5d918af5187f6 0.081125977083 0 of 1 -
01: 829a837739e281ed2bfc06f243882d7589ad99475882de8bb9e948b936832d0e 0.200000000000 764740 of 1272211 -
02: 501cdf23749c03068bad0ba91d8fdbbce41010cb6f67294c94d53c60070426a3 0.600000000000 355899 of 650760 -
03: a7f54c65b60cc16d629a90fb8cf3c79a3072355abbfeed5a0399bcee30c4ec90 9.000000000000 33513 of 274259 -
04: fc114501176fec53aab15da4ddf5d50310022bde23e31dfc2bdcf94deb45badd 90.000000000000 8348 of 36286 -
05: 7e57a0ebe576a3410ee380fae3c43628302581ede582e9104375e3b3161daefe 300.000000000000 2365 of 16700 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



1 inputs(s) for total of 400.000000000000 xmr

key image 00: 9f7658dc06f327896345afb77d503535f18c89e44f7f4764ea5d4d976b60f031 amount: 400.000000000000
ring members blk
- 00: c876a55a827157f7045a1b8c5821877f8e0c0924f99973ae4f99dbc67aec805a 00414765
More details
source code | moneroexplorer