Monero Transaction 6bf6bab2a7bae6b57e73ce2c480ebaf75e64a9d700d4bbada8d6e0212e2e35c7

Autorefresh is OFF

Tx hash: 6bf6bab2a7bae6b57e73ce2c480ebaf75e64a9d700d4bbada8d6e0212e2e35c7

Tx public key: 33b57f6cd9eb39a1d6503a4944a59636656580168326d6977ac4c539a77b38ed
Payment id: ae8e4664ae9b8f0fadf7aef2fd7a4b23fe413dd81a34ba97e3c5d31c12feecb1

Transaction 6bf6bab2a7bae6b57e73ce2c480ebaf75e64a9d700d4bbada8d6e0212e2e35c7 was carried out on the Monero network on 2016-10-10 14:14:12. The transaction has 2141661 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1476108852 Timestamp [UTC]: 2016-10-10 14:14:12 Age [y:d:h:m:s]: 08:057:16:18:54
Block: 1154437 Fee (per_kB): 0.010000000000 (0.006645035691) Tx size: 1.5049 kB
Tx version: 1 No of confirmations: 2141661 RingCT/type: no
Extra: 0133b57f6cd9eb39a1d6503a4944a59636656580168326d6977ac4c539a77b38ed022100ae8e4664ae9b8f0fadf7aef2fd7a4b23fe413dd81a34ba97e3c5d31c12feecb1de2021dea35b1c011bcf2f5b4ca07a6008c1f23d72c7b3dc370a010c44a1e42c8236

6 output(s) for total of 6.206000000000 xmr

stealth address amount amount idx tag
00: bd97f8a400b092de845968c926d179b8e1eaf69a3e6386d2162b9d97442c3b29 0.006000000000 226948 of 256624 -
01: 1d9bb048f9549d26bb0afcec51ded5d14394599367c93c09c2bc1d100b4f0850 0.010000000000 464576 of 502466 -
02: 2deb812ec3826cdf6df80041053cd792626e6fefb75db1a2d02827ef0f2eac56 0.090000000000 264548 of 317822 -
03: d434b049c9a2a45f2f3db9a2bcb95c127997eec539b9ab030827269d33a7deb7 0.200000000000 1187834 of 1272210 -
04: d35fa23a5dc6c419b1b1e0049ec55e678d96dbc9906bd94b1416c2007fb96336 0.900000000000 406605 of 454894 -
05: ba7a8ebe59042e13baa7ab6a346c192fcbf1b2be0bd957a9ad7f09403a671a9c 5.000000000000 232093 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



5 inputs(s) for total of 6.216000000000 xmr

key image 00: 782405dffe8de0c2b3058fe43f6a8faff57ab2b8fcb721916250e253f5010cb6 amount: 0.050000000000
ring members blk
- 00: ad5ae385401199966cf16ae8aa4daa9b99bf8a6101bd47218b1de5320fa638c6 00058375
- 01: 67da7e9d3b3cea01d1b3aef483022d157b9209aa6d35e53398a444b40fc23fe2 00059976
- 02: 45d3b098f4129c05c5960764b7c9cc9759b6871a4194213e5ca5db9924153f72 01154416
key image 01: 632022ad204ab79d61643d9c3a8bcdd126919a0a05e1e981d939479e879be74b amount: 0.090000000000
ring members blk
- 00: e8e9ed9ac99ac47f78b250f133aa1e42a984c3eccb9153b6f71e6804297f341a 00086315
- 01: 653cf5213e2e9bd904a3a67d0d0d455584a06010edd674d6ce5a1d26105a7a74 00133913
- 02: 354479c7c2145fc1232acc4083e8edec969b0ef20f5d300bc83773b2baa9ba94 01154389
key image 02: dda0cb6aefcbdff4475e4fce19dc5f0c2bf715ebd13fad030d9581cc36bd12d7 amount: 0.070000000000
ring members blk
- 00: b2ddd76a180c9104d3ed3586643b09fdcde47daa62f4ddd6208b3f8dd63c883a 00079681
- 01: b26b45a051a6962450a84ad4acf349ebfa12bf5472f1f8c0dd6b1a4f8c9ace31 00460211
- 02: 0859c91b72b6dcdf3ba86ad708e7f6115af5b73f3e399776856078e618214813 01154427
key image 03: ad4aa1d0384714ddeedfff1c36984c3f8b5aa5f8b785d6ed4fc524cab5a630b6 amount: 0.006000000000
ring members blk
- 00: cc46fe5a35d9c95d5c6c96899d82ec68316c8c2e2351e426cf210a138dd4bdbb 00080996
- 01: 45121bba610ebf153f8897b2b1de14cc15d3db160adc44f8c8410d1311072238 00081497
- 02: 9a84236bfb500738867629df021bd211fad2d42de06efb521006b4945b8ba9fe 01154397
key image 04: eec384972ba0e0fe39d398e0e76a67061abb70a5d10bc15b0d08ad34be77cbad amount: 6.000000000000
ring members blk
- 00: 951b399decdd8a34b726c25ec5395f6870ce0dc004078a868472fc9b3c8e6059 00050958
- 01: fd201d18f890ef7b3403acda69174dae5fd5ace74eeff501b5d7676518077194 00077104
- 02: a3ce609045c36996653cce39338346dc910455483444e12a4160505733727c3c 01154403
More details
source code | moneroexplorer