Monero Transaction 6bd53b41d7ccd8213508a71455fea5e26e6f1564770c70bb1244819e5c1ba2f5

Autorefresh is OFF

Tx hash: 6bd53b41d7ccd8213508a71455fea5e26e6f1564770c70bb1244819e5c1ba2f5

Tx prefix hash: 507405411de1cd9b2f0214cba4e83b68a84b944dd0413da94993bb8597efac10
Tx public key: bc4c6716c141f256f8a4b6730d9d0d56212ea441fd2f941ea0ff2b86531815cb
Payment id: c79e9b223f1b042977bd1cf9b557df570029bb7f82857757917ee0fc46cefd5f

Transaction 6bd53b41d7ccd8213508a71455fea5e26e6f1564770c70bb1244819e5c1ba2f5 was carried out on the Monero network on 2014-07-13 13:21:27. The transaction has 3166476 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1405257687 Timestamp [UTC]: 2014-07-13 13:21:27 Age [y:d:h:m:s]: 10:143:17:48:49
Block: 126800 Fee (per_kB): 0.005000000000 (0.009275362319) Tx size: 0.5391 kB
Tx version: 1 No of confirmations: 3166476 RingCT/type: no
Extra: 022100c79e9b223f1b042977bd1cf9b557df570029bb7f82857757917ee0fc46cefd5f01bc4c6716c141f256f8a4b6730d9d0d56212ea441fd2f941ea0ff2b86531815cb

4 output(s) for total of 400.080000000000 xmr

stealth address amount amount idx tag
00: 16f7dc71e6f1257fe4782eb564a0e34e0d8296b178f3a72716b53881c0757d29 0.080000000000 77061 of 269576 -
01: 04570e7ab27ac9bb8a90926ab977af34f0567f0498ba38a0d5129f1fa3a8b733 10.000000000000 142620 of 921411 -
02: 41f3585a47f8231a502484e51ba767e0398b3ea5fa49c0dc5ca0f3cac228049f 90.000000000000 1849 of 36286 -
03: 74986e3cb88a574be10fab0416d2f2072637c01f6dd2a04c214d6313a1440044 300.000000000000 577 of 16700 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-13 11:53:38 till 2014-07-13 14:10:16; resolution: 0.00 days)

  • |___________________________________________________________________________*______________________________________________________________________________________________|
  • |_______________________________________________________________________________________________*__________________________________________________________________________|
  • |_______________________________________________________________________________________________*__________________________________________________________________________|

3 inputs(s) for total of 400.085000000000 xmr

key image 00: de5553f7277e058e8fd6faeb918b6a5ed3cbe50c3baced5daabea65cd916312c amount: 0.005000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 178b18f4522e8534ba0567a07dc0b418f35865f3c0d4667b72c931e81ceeffe6 00126775 1 10/4 2014-07-13 12:53:38 10:143:18:16:38
key image 01: ead771486fe18c5a5cb3659d71a807c26105156f4550ae2ff6f12a7bf5202308 amount: 0.080000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b312bb9241b31c32cf10e567829a4834e289f735ddfd2b9499ca6d706064e0cf 00126789 1 9/7 2014-07-13 13:10:16 10:143:18:00:00
key image 02: 1a57dcaefaa8c6a9b75304cea704fa81f84da9ddfcf5212949f9816a03c0e68b amount: 400.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8fba6853617354e6fe685d4e4eea70309b6d8ab13f8c3355e405db994d0f3234 00126789 1 9/7 2014-07-13 13:10:16 10:143:18:00:00
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000, "key_offsets": [ 187345 ], "k_image": "de5553f7277e058e8fd6faeb918b6a5ed3cbe50c3baced5daabea65cd916312c" } }, { "key": { "amount": 80000000000, "key_offsets": [ 77058 ], "k_image": "ead771486fe18c5a5cb3659d71a807c26105156f4550ae2ff6f12a7bf5202308" } }, { "key": { "amount": 400000000000000, "key_offsets": [ 550 ], "k_image": "1a57dcaefaa8c6a9b75304cea704fa81f84da9ddfcf5212949f9816a03c0e68b" } } ], "vout": [ { "amount": 80000000000, "target": { "key": "16f7dc71e6f1257fe4782eb564a0e34e0d8296b178f3a72716b53881c0757d29" } }, { "amount": 10000000000000, "target": { "key": "04570e7ab27ac9bb8a90926ab977af34f0567f0498ba38a0d5129f1fa3a8b733" } }, { "amount": 90000000000000, "target": { "key": "41f3585a47f8231a502484e51ba767e0398b3ea5fa49c0dc5ca0f3cac228049f" } }, { "amount": 300000000000000, "target": { "key": "74986e3cb88a574be10fab0416d2f2072637c01f6dd2a04c214d6313a1440044" } } ], "extra": [ 2, 33, 0, 199, 158, 155, 34, 63, 27, 4, 41, 119, 189, 28, 249, 181, 87, 223, 87, 0, 41, 187, 127, 130, 133, 119, 87, 145, 126, 224, 252, 70, 206, 253, 95, 1, 188, 76, 103, 22, 193, 65, 242, 86, 248, 164, 182, 115, 13, 157, 13, 86, 33, 46, 164, 65, 253, 47, 148, 30, 160, 255, 43, 134, 83, 24, 21, 203 ], "signatures": [ "0f10ef2d94ac056abcc87b199fcd7518bc8778c5a3b4fd4048676eb132bbfc060bf0f9e1a9212d446219e9da7545151360b82d12a06c7bd12efe00757410520e", "f2a2d5fa725546b93d4783d60874fb74f0410ee48d3ca00833e686c27ff0e4013e2d90e93c8dc4a805b4bca00227a80df124bdef9f417add57377ffcc028a00d", "7b950d6b911727d12d112ee4a5f1cc87ff041c83543d62e19c4c9d3f75d0bd07aa2e1444e4e16011edb7055fbadaac5dc1b4a6fb9b4418fdc24c537501c3c10b"] }


Less details
source code | moneroexplorer