Monero Transaction 6bc4edcda8b5cb536e9d70a40a44051d0cfc88b4f4d7f5f6909a1041bd2c3bf0

Autorefresh is OFF

Tx hash: 6bc4edcda8b5cb536e9d70a40a44051d0cfc88b4f4d7f5f6909a1041bd2c3bf0

Tx prefix hash: 136d6410578ba84f7677fde59a37ab61a33671db4f9936f4f72db8f2ee2bb5bc
Tx public key: 9258c4f5c8ca6d3bb0b85e279ffe3162cf7e4d03d55a359b9c479b36f5290a43
Payment id: 913ee402664f4a9c89a24eb265a43a60d2dc0d4bbfff4e67abb6ca2bcd11393c

Transaction 6bc4edcda8b5cb536e9d70a40a44051d0cfc88b4f4d7f5f6909a1041bd2c3bf0 was carried out on the Monero network on 2017-01-03 17:35:15. The transaction has 2088957 confirmations. Total output fee is 0.002000000000 XMR.

Timestamp: 1483464915 Timestamp [UTC]: 2017-01-03 17:35:15 Age [y:d:h:m:s]: 07:349:16:10:00
Block: 1215882 Fee (per_kB): 0.002000000000 (0.002737967914) Tx size: 0.7305 kB
Tx version: 1 No of confirmations: 2088957 RingCT/type: no
Extra: 022100913ee402664f4a9c89a24eb265a43a60d2dc0d4bbfff4e67abb6ca2bcd11393c019258c4f5c8ca6d3bb0b85e279ffe3162cf7e4d03d55a359b9c479b36f5290a43

5 output(s) for total of 3.398000000000 xmr

stealth address amount amount idx tag
00: 332b5caf88830df66a2a7f59ce02ceb5d43655f7630dfc03c501a0838be68a16 0.008000000000 235214 of 245068 -
01: bd9f77d3c982cd8521568d04fb67835e3f0292f974b0550f759e622ee5eefafa 0.090000000000 307368 of 317822 -
02: 94027959aeaaea824b2c3a8e0fcf404dae0cc3954055a1a9b9a0dbe822c3ff4f 0.300000000000 961600 of 976536 -
03: 9832977a68b3f345c4bf78382114c845f47120a6e18292a273b75e9138ed3304 1.000000000000 864290 of 874630 -
04: f9b52bbe585986d9e2e5f6e11fb19c9c48909d5f8a12ecd33fd90509ffa7e456 2.000000000000 429330 of 434058 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-01-11 23:20:41 till 2017-01-03 13:59:30; resolution: 4.25 days)

  • |_*__________________________________________________________*____________________________________________________________________________________________________________*|
  • |_________________________________________________________________________________________________________*_______________________________________________*_______________*|

2 inputs(s) for total of 3.400000000000 xmr

key image 00: 1bc4a010053b0c078a5a2aea99f9ea5df11fe0fb1a9d63c22500f40e1041905e amount: 0.400000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c6f03b959f16c1f166c914a193c9aa39dbff253b9b3210a57f26ecf62e2ece12 00387927 4 3/10 2015-01-12 00:20:41 09:342:09:24:34
- 01: fb074c761c7cc1b0148cde72ac5a51f51c24f60c170937de36fb4b752c22f7a3 00750999 4 2/154 2015-09-22 23:21:52 09:088:10:23:23
- 02: 667d3dc472511f242a2fa83eca155108794770e5749a11bef95a01e9462e9262 01215719 3 2/6 2017-01-03 12:34:39 07:349:21:10:36
key image 01: 82f3642f52fca76e80c67e5b2e8e220f505c20e4f71bdc5288cd534154a40270 amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e3e93645636e321a6433688ad14d64e522e8573377ef10da73e2764954bc835d 01017582 0 0/6 2016-04-03 10:07:30 08:259:23:37:45
- 01: a187c3e26d36d6f730209b57be44a614ea37c881beea7d1c939fe69ea6ba8be6 01165220 3 81/82 2016-10-25 13:15:06 08:054:20:30:09
- 02: bb0d4e907617ea30449bdaf23135468455e4be6f1863a03e1ff12ddc4d3041b2 01215733 3 2/5 2017-01-03 12:59:30 07:349:20:45:45
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 400000000000, "key_offsets": [ 328974, 155044, 195916 ], "k_image": "1bc4a010053b0c078a5a2aea99f9ea5df11fe0fb1a9d63c22500f40e1041905e" } }, { "key": { "amount": 3000000000000, "key_offsets": [ 241067, 39880, 15699 ], "k_image": "82f3642f52fca76e80c67e5b2e8e220f505c20e4f71bdc5288cd534154a40270" } } ], "vout": [ { "amount": 8000000000, "target": { "key": "332b5caf88830df66a2a7f59ce02ceb5d43655f7630dfc03c501a0838be68a16" } }, { "amount": 90000000000, "target": { "key": "bd9f77d3c982cd8521568d04fb67835e3f0292f974b0550f759e622ee5eefafa" } }, { "amount": 300000000000, "target": { "key": "94027959aeaaea824b2c3a8e0fcf404dae0cc3954055a1a9b9a0dbe822c3ff4f" } }, { "amount": 1000000000000, "target": { "key": "9832977a68b3f345c4bf78382114c845f47120a6e18292a273b75e9138ed3304" } }, { "amount": 2000000000000, "target": { "key": "f9b52bbe585986d9e2e5f6e11fb19c9c48909d5f8a12ecd33fd90509ffa7e456" } } ], "extra": [ 2, 33, 0, 145, 62, 228, 2, 102, 79, 74, 156, 137, 162, 78, 178, 101, 164, 58, 96, 210, 220, 13, 75, 191, 255, 78, 103, 171, 182, 202, 43, 205, 17, 57, 60, 1, 146, 88, 196, 245, 200, 202, 109, 59, 176, 184, 94, 39, 159, 254, 49, 98, 207, 126, 77, 3, 213, 90, 53, 155, 156, 71, 155, 54, 245, 41, 10, 67 ], "signatures": [ "e5c170340d9e2fc686ae413eb34ed90fe20d34bde4e59e9d34e83a8a385444006a49270cdf879034d30b8f3dcb22dbb514ce497217b1ecb530991e7920e1eb000024c472b6445f529998a8a38eaf52bab6e3eaa79b7dc483891fd853545dd401069c76c5e1a26631e478fc723282c94f0758590ae845bc6b94c2028ad2738b07ad381aee2149f28a70059d963f947f6a5e3a6e98493d224a05458689995785070ac5566543b9ca1192624a7609b1e9fe4d1d6e7af7184dc36f3d848320999b04", "0627ce9218075be63c639849cab077a2d584dff8c019a6675f7af7fe663d120319db5ea7f04ce3d053e0db89783f8d595e219ecec3b5496cffe55e357fd391068e195c17c3dd10c02fa04ea939d102f5f603d2cb1f81eb84932d7d5ee2eb110326fffb4fc998b789c6b0ec89705b3280626de47f6391665bd14e2537092ffc016adb975eac7d227c3dd2ed9cb738a873af3bac6449fad7876817b67960fc030cd245668c485d4803cca00221022748156e32e84ed9808638d19e00f79ab4e20a"] }


Less details
source code | moneroexplorer