Monero Transaction 6ca253725d2bd81af7e770c83096f57b340c6da0a77f7ccf684d840b8485451b

Autorefresh is OFF

Tx hash: 6ca253725d2bd81af7e770c83096f57b340c6da0a77f7ccf684d840b8485451b

Tx prefix hash: 3808d6853793c40a9daeb12e0c9425f8fd4d2155fecaae1300fe270333962666
Tx public key: ff98def455865a3f9971a0d6933ca79f1e168645724615133cdc5251f9b8f527
Payment id: 5145a0d54ec5c5ba3821c7910ba142ba30fd0d24bf984427d59ad3bde5f37ada

Transaction 6ca253725d2bd81af7e770c83096f57b340c6da0a77f7ccf684d840b8485451b was carried out on the Monero network on 2015-04-29 17:16:04. The transaction has 2778266 confirmations. Total output fee is 0.179965533087 XMR.

Timestamp: 1430327764 Timestamp [UTC]: 2015-04-29 17:16:04 Age [y:d:h:m:s]: 09:256:09:09:53
Block: 542207 Fee (per_kB): 0.179965533087 (0.491425882350) Tx size: 0.3662 kB
Tx version: 1 No of confirmations: 2778266 RingCT/type: no
Extra: 0221005145a0d54ec5c5ba3821c7910ba142ba30fd0d24bf984427d59ad3bde5f37ada01ff98def455865a3f9971a0d6933ca79f1e168645724615133cdc5251f9b8f527

5 output(s) for total of 4.820034466913 xmr

stealth address amount amount idx tag
00: 1319bd9e71ed0b816a6f73c896474ad5d10798026554f5232b6239a2b3ecf64c 0.020034466913 0 of 1 -
01: fca2acc00975085000cb822c406335909a635cd4fad1f3f8f38f1a10dc460f65 0.200000000000 874449 of 1272211 -
02: 48b83bdc1272e3331665f0edcc287e0dfc91e8a11bbdc69dedd452205e8979f1 0.600000000000 420887 of 650760 -
03: fe5d8bcebab92f198e029918aab9bac336d72b3360e60756352267197844f8dc 1.000000000000 549035 of 874630 -
04: 51eec10bf35349eea4d1714ab9fe7a2725e5fd62d91615b4d8f2fbdd5c9a43ee 3.000000000000 189007 of 300495 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-04-29 15:22:16 till 2015-04-29 17:22:16; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|

1 inputs(s) for total of 5.000000000000 xmr

key image 00: e6bebfc2a54aea13e122998f472832e36fb13b82b2616135b32c245716e5fca6 amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 616bd81564f72de78e304500220a9d214a28bc21be70e5422b752eae3a0e2404 00542147 1 3/5 2015-04-29 16:22:16 09:256:10:03:41
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000000, "key_offsets": [ 163815 ], "k_image": "e6bebfc2a54aea13e122998f472832e36fb13b82b2616135b32c245716e5fca6" } } ], "vout": [ { "amount": 20034466913, "target": { "key": "1319bd9e71ed0b816a6f73c896474ad5d10798026554f5232b6239a2b3ecf64c" } }, { "amount": 200000000000, "target": { "key": "fca2acc00975085000cb822c406335909a635cd4fad1f3f8f38f1a10dc460f65" } }, { "amount": 600000000000, "target": { "key": "48b83bdc1272e3331665f0edcc287e0dfc91e8a11bbdc69dedd452205e8979f1" } }, { "amount": 1000000000000, "target": { "key": "fe5d8bcebab92f198e029918aab9bac336d72b3360e60756352267197844f8dc" } }, { "amount": 3000000000000, "target": { "key": "51eec10bf35349eea4d1714ab9fe7a2725e5fd62d91615b4d8f2fbdd5c9a43ee" } } ], "extra": [ 2, 33, 0, 81, 69, 160, 213, 78, 197, 197, 186, 56, 33, 199, 145, 11, 161, 66, 186, 48, 253, 13, 36, 191, 152, 68, 39, 213, 154, 211, 189, 229, 243, 122, 218, 1, 255, 152, 222, 244, 85, 134, 90, 63, 153, 113, 160, 214, 147, 60, 167, 159, 30, 22, 134, 69, 114, 70, 21, 19, 60, 220, 82, 81, 249, 184, 245, 39 ], "signatures": [ "2ddba4c5647cc28f396c65c53dd0a130b5bb24fa2791502e90745c3023651500f978618d9f4cc339466a40d9a35f1ffa908b59c1f2a8b59ed0ddc02240d1f907"] }


Less details
source code | moneroexplorer