Monero Transaction 6bb40c106428070ab0a05774c3a0b14cc7ce266fbaa7ca9b433a63516afc1b92

Autorefresh is OFF

Tx hash: 6bb40c106428070ab0a05774c3a0b14cc7ce266fbaa7ca9b433a63516afc1b92

Tx prefix hash: 29d5bcf6b2033715ca8514659d2f0aab289ec1d1c2a58fd41fa306f877518974
Tx public key: d06fb9552688a717e4c51e406d0bec2d09faa7bc4852c2acd0dbeda08d8b5d69
Payment id: bbb3b3dec73a9892b2eeae30b09dcd3effb496bf99502fae33ed42a9c7efdb61

Transaction 6bb40c106428070ab0a05774c3a0b14cc7ce266fbaa7ca9b433a63516afc1b92 was carried out on the Monero network on 2014-07-31 01:39:32. The transaction has 3128746 confirmations. Total output fee is 0.005586730001 XMR.

Timestamp: 1406770772 Timestamp [UTC]: 2014-07-31 01:39:32 Age [y:d:h:m:s]: 10:109:03:24:19
Block: 152199 Fee (per_kB): 0.005586730001 (0.005516693849) Tx size: 1.0127 kB
Tx version: 1 No of confirmations: 3128746 RingCT/type: no
Extra: 022100bbb3b3dec73a9892b2eeae30b09dcd3effb496bf99502fae33ed42a9c7efdb6101d06fb9552688a717e4c51e406d0bec2d09faa7bc4852c2acd0dbeda08d8b5d69

7 output(s) for total of 4.861413269999 xmr

stealth address amount amount idx tag
00: 76e0ea33311b028d0a9bdc93a74de5e525a6d1589e866f2049dc3fcf35f64103 0.004413269999 0 of 1 -
01: 114cf32b811ea02fce9205f11138df4abcd7162e96a0a2c224697f1a49b58df1 0.007000000000 167553 of 247340 -
02: 7f8aa3de591383b9d1b24727a3846b09973cf704dc614d32741ad51c65634d7f 0.010000000000 321287 of 502466 -
03: 70db3ae9def424b98b409d29dced798c334c1097d84f731785391295e0bbc2f2 0.040000000000 127057 of 294095 -
04: 417303090140d59ea652928552c6384b5954f93fbd91956bb08d5c08954f8218 0.800000000000 91891 of 489955 -
05: 42604d1b540b9b2ccbbd3dc8521a39695932ca068fb7790be01876b1a8e3d0a6 1.000000000000 152105 of 874629 -
06: 7d544f2f6bee2cd4031b0f0a9a54622a7b1b1e7d50c4d29200d95606fa600bf5 3.000000000000 37514 of 300495 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-28 04:17:45 till 2014-07-31 02:17:15; resolution: 0.38 days)

  • |_____________________________________________________________________________________________*___________________________________________________________________________*|
  • |_________________________*_______________________________________________________________________________________________________________________________________________*|
  • |_______________________________*_________________________________________________________________________________________________________________________________________*|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|

4 inputs(s) for total of 4.867000000000 xmr

key image 00: 6f049afac03e3ecdd79864c28a92cb2deb158edf807c51185556b1d35eecba9c amount: 0.800000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: bf4fe4dae06d1800debf3d36b9337796b7ee0eb9261d43cf4e29243e22208e96 00110383 1 23/64 2014-07-02 00:40:47 10:138:04:23:04
- 01: 0399dd9ade901d433b00dc1e87d5cedc69106a3962ca175dc062c1d425b3b932 00152180 2 6/7 2014-07-31 01:17:15 10:109:03:46:36
key image 01: 5adddcd449f2594f0f894f3acac9b419b4b9fc08a46057bb8f8b8be3d3a5ec94 amount: 0.007000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 21d668f56402026343d3c917e1d3fabc5ef0b376b72a6ff2fade6ed68d9e567c 00073217 1 3/107 2014-06-06 10:43:47 10:163:18:20:04
- 01: 16374e1103f8e9a9c8ce06e4aa679e27678c0c5fa599543ab0de2457bb0f523e 00152038 0 0/6 2014-07-30 22:37:31 10:109:06:26:20
key image 02: eaa90f7c1ba770e147714a2a49c0d2aec26f5c84fb47038c21effa563ab96633 amount: 0.060000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0636d3ed74c640bb81d2528cec09dfe74ba44d513b456de37d162b3f6ee17745 00076483 1 3/142 2014-06-08 18:03:44 10:161:11:00:07
- 01: c0ec6f24abe531d78d5215b7fc0b6aeca3026da22aecde2aeffc5089b00cab43 00152136 2 1/9 2014-07-31 00:31:09 10:109:04:32:42
key image 03: 8050729218ac4e5deacbb522edabf35820353d44bc60b6872761c6bca37bc2b1 amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 121f56bfd245febd19026b47193212f467ce5737ffd00eec5e18ea8f4abae6d4 00059916 1 21/166 2014-05-28 05:17:45 10:172:23:46:06
- 01: 68ae9e2bd836816ff39ebb2bff45673b14df47544b9e9f352bfb89769554c2fb 00152073 2 3/8 2014-07-30 23:23:01 10:109:05:40:50
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 800000000000, "key_offsets": [ 39521, 52320 ], "k_image": "6f049afac03e3ecdd79864c28a92cb2deb158edf807c51185556b1d35eecba9c" } }, { "key": { "amount": 7000000000, "key_offsets": [ 50744, 116767 ], "k_image": "5adddcd449f2594f0f894f3acac9b419b4b9fc08a46057bb8f8b8be3d3a5ec94" } }, { "key": { "amount": 60000000000, "key_offsets": [ 34969, 63458 ], "k_image": "eaa90f7c1ba770e147714a2a49c0d2aec26f5c84fb47038c21effa563ab96633" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 1961, 28224 ], "k_image": "8050729218ac4e5deacbb522edabf35820353d44bc60b6872761c6bca37bc2b1" } } ], "vout": [ { "amount": 4413269999, "target": { "key": "76e0ea33311b028d0a9bdc93a74de5e525a6d1589e866f2049dc3fcf35f64103" } }, { "amount": 7000000000, "target": { "key": "114cf32b811ea02fce9205f11138df4abcd7162e96a0a2c224697f1a49b58df1" } }, { "amount": 10000000000, "target": { "key": "7f8aa3de591383b9d1b24727a3846b09973cf704dc614d32741ad51c65634d7f" } }, { "amount": 40000000000, "target": { "key": "70db3ae9def424b98b409d29dced798c334c1097d84f731785391295e0bbc2f2" } }, { "amount": 800000000000, "target": { "key": "417303090140d59ea652928552c6384b5954f93fbd91956bb08d5c08954f8218" } }, { "amount": 1000000000000, "target": { "key": "42604d1b540b9b2ccbbd3dc8521a39695932ca068fb7790be01876b1a8e3d0a6" } }, { "amount": 3000000000000, "target": { "key": "7d544f2f6bee2cd4031b0f0a9a54622a7b1b1e7d50c4d29200d95606fa600bf5" } } ], "extra": [ 2, 33, 0, 187, 179, 179, 222, 199, 58, 152, 146, 178, 238, 174, 48, 176, 157, 205, 62, 255, 180, 150, 191, 153, 80, 47, 174, 51, 237, 66, 169, 199, 239, 219, 97, 1, 208, 111, 185, 85, 38, 136, 167, 23, 228, 197, 30, 64, 109, 11, 236, 45, 9, 250, 167, 188, 72, 82, 194, 172, 208, 219, 237, 160, 141, 139, 93, 105 ], "signatures": [ "9b658018ab4079fb98c40452e4b4b762d83f631827ff20ebb881c281c33fcb0a6d1f0b9fbf9bbe3ee0583bc698473b45136b255f1db0bb0bba8f13349af17e04f2b0374c046dd3be5c553b294cdb6b4d65372d53920a35ea47c69115d6244b0e94a95a438dbb924beb631f483c957241f5a1d64adee5787184def2d68de6780b", "439a14213f640fd3aaa292b5e45b4cf78fe375a36b64cd3010071a9fc84a9e0d8798a688381d05df0cf92282ca961cb6c8be542decfc6fd9829c551ffbbc140e3c760e609cf6a984fe634dd843a2d0b32e5fe0e1653f2974fce95d7bc67e8a03b4e5073030a903ca0cae4a2a9cd54549925961f2f04655146c121aa88dfd4108", "6ba0ad8f1f8650d651f079d74ccab6d9565970652b65c4cd4ea9b9248fbf32069cbca3edc3bfe72e2bc920650e7bb3f2ef3822c2b4bafd54c58bc5a87a7f4603693cbce5632b5b9c4321a56a2eea87cf141550fbccc6d2d1953e41334b083802725aa8addc971a329b018ecdefcf6e6cc02420032e4f3039e4328d1d878a170f", "c654cb09f8ff1ff22c3b411457ba32b77c4ebac474759ba696ac535a19ba34072c574d78e0579bd0c02c835d7aaa39d103cbbf35391f2d4ceb7bb6caf65de1085b51da3a14e059d96732a2136b2bb30de007415ac409f04dc37ec9db9241b20f84c39d81fb91550feaad0afaba069edc4035702560dc3be1167e13f880eb2708"] }


Less details
source code | moneroexplorer