Monero Transaction 6d45007c5e0c2d533a6fe316375a350e48650afab8ffc84520e89bd37922e707

Autorefresh is OFF

Tx hash: 6d45007c5e0c2d533a6fe316375a350e48650afab8ffc84520e89bd37922e707

Tx prefix hash: a6218dac07082447941e48322f074d72bfd2d14ec2df8e74c5fa1b1a13a194f9
Tx public key: e6f87fd9d376747f4002e1fccee3da1fb50ea00130d384460f22a8cff6491f28
Payment id: e289c6b6af32822ae280d12bb812f300c7fff3eaf6aea14ae5b955fd43e704d9

Transaction 6d45007c5e0c2d533a6fe316375a350e48650afab8ffc84520e89bd37922e707 was carried out on the Monero network on 2016-09-10 03:43:59. The transaction has 2161175 confirmations. Total output fee is 0.020000000000 XMR.

Timestamp: 1473479039 Timestamp [UTC]: 2016-09-10 03:43:59 Age [y:d:h:m:s]: 08:084:22:27:34
Block: 1132660 Fee (per_kB): 0.020000000000 (0.027306666667) Tx size: 0.7324 kB
Tx version: 1 No of confirmations: 2161175 RingCT/type: no
Extra: 022100e289c6b6af32822ae280d12bb812f300c7fff3eaf6aea14ae5b955fd43e704d901e6f87fd9d376747f4002e1fccee3da1fb50ea00130d384460f22a8cff6491f28

5 output(s) for total of 6.060000000000 xmr

stealth address amount amount idx tag
00: 6f222359eaaafba88a5a0ac7fd9c4cf0bcbc283b95a23024c47d562199adf0f1 0.060000000000 225781 of 264760 -
01: 193ac9b50685a67e788eded5ead6960b4aab8eb96ee2b6a44c4bf462872b48fa 0.400000000000 610651 of 688584 -
02: 32aa1efaa2b3106cf0a69a2967dfaf3a86e782c035dfdaef7b57b8a3a8b1c1f0 0.600000000000 600525 of 650760 -
03: 2f4d79e92bb09ddb9cc22d90a0a9d2251148842a23985113b6db37733a2d6f13 1.000000000000 793596 of 874629 -
04: 8b2aa873dbf659919ce50186439ff0eba64f011042c4d79ff7db9b049051a633 4.000000000000 211576 of 237197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-09-12 06:53:17 till 2016-09-09 11:39:54; resolution: 4.28 days)

  • |_*________________________________________________________________________________________________________________________________________*______________________________*|
  • |________________________________________________________________________________________________________________________________*________________________________________*|

2 inputs(s) for total of 6.080000000000 xmr

key image 00: 94a1c64c6a7d349b4b81cbc5b9978450940dab08f70365d12fb8710b7487aecd amount: 0.080000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: cc85a54408f59400a4cc91b7a6bed3b4386800377a5b13659f3432b1a6e37179 00214328 0 0/5 2014-09-12 07:53:17 10:083:18:18:16
- 01: 1e413dd0704b090176f05a0ecfef2f79f8c1d1cf52aac47036717509252ac077 01033072 0 0/5 2016-04-24 23:54:43 08:223:02:16:50
- 02: 50cab41defbf005ab08b60649cec122d92b4ed369327e72050666fc32eb737df 01132118 3 2/5 2016-09-09 10:39:54 08:085:15:31:39
key image 01: 1a8d923899c532896d27804dc5376b05ff40c1b8c3f4ff43c9a76e14067ce0dd amount: 6.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e184d1650a9b154e203fb510e32456c5a9f74a4f17ce078b2e686b264a06bb4f 00994942 0 0/4 2016-03-13 04:12:38 08:265:21:58:55
- 01: 4ecf5189aa045bb97200a3b2111d2e28ec547eec6bd03e1bbea24c03ce2aae00 00998503 0 0/3 2016-03-15 15:16:13 08:263:10:55:20
- 02: bad6811a52641d4f1fe1a065f6d824299dfdb27659e8f90d612e50f8b08dbd62 01131954 3 2/11 2016-09-09 05:40:48 08:085:20:30:45
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 80000000000, "key_offsets": [ 102127, 98942, 23797 ], "k_image": "94a1c64c6a7d349b4b81cbc5b9978450940dab08f70365d12fb8710b7487aecd" } }, { "key": { "amount": 6000000000000, "key_offsets": [ 155727, 3858, 26933 ], "k_image": "1a8d923899c532896d27804dc5376b05ff40c1b8c3f4ff43c9a76e14067ce0dd" } } ], "vout": [ { "amount": 60000000000, "target": { "key": "6f222359eaaafba88a5a0ac7fd9c4cf0bcbc283b95a23024c47d562199adf0f1" } }, { "amount": 400000000000, "target": { "key": "193ac9b50685a67e788eded5ead6960b4aab8eb96ee2b6a44c4bf462872b48fa" } }, { "amount": 600000000000, "target": { "key": "32aa1efaa2b3106cf0a69a2967dfaf3a86e782c035dfdaef7b57b8a3a8b1c1f0" } }, { "amount": 1000000000000, "target": { "key": "2f4d79e92bb09ddb9cc22d90a0a9d2251148842a23985113b6db37733a2d6f13" } }, { "amount": 4000000000000, "target": { "key": "8b2aa873dbf659919ce50186439ff0eba64f011042c4d79ff7db9b049051a633" } } ], "extra": [ 2, 33, 0, 226, 137, 198, 182, 175, 50, 130, 42, 226, 128, 209, 43, 184, 18, 243, 0, 199, 255, 243, 234, 246, 174, 161, 74, 229, 185, 85, 253, 67, 231, 4, 217, 1, 230, 248, 127, 217, 211, 118, 116, 127, 64, 2, 225, 252, 206, 227, 218, 31, 181, 14, 160, 1, 48, 211, 132, 70, 15, 34, 168, 207, 246, 73, 31, 40 ], "signatures": [ "9fbc832d3a406f2a6b96782bbca9d1d098925ea45b724687d95a6dd1c562390eed9a4b9d1ce1e60f00116a3b5620a200ba7390091c8f8d17c9fcdce306f431069860373f2e86e7e66203ee2b0f8d37ad872ce423c441b5ac961ae1e5ea106d07b8f7868390fe8950de500b4c87bdadc9024d39fe91639cc662124a8b0de9100d59c354029abba7ea4bdcea6aa11ce62101529ec4e17885f36ed55e79632de50cffe2d6aebcf9f6989aa8d744a056ff8bd493ce6c62f5c60d6ea1e9d553969a0a", "b8094c98b113740577dea20783e3c29bd34aade94fa6435be3591274d616ea035d7fdea8d706359a024f1e1aca2356cdeed425d7852af97a4da9c986099c31042377f60e26e5aac2fa61f9456ec4ec82c85b71e2aa519e2c3d24260da8b44d0406b95d0e31c141d72f242a4db630cbf8fcc9b49bb10ea2c810d347257134a805bceea5eaf206f0a42d95ab4e68da9fab57a4a9b8ddbe6398b9b250f271337709fcd98df4a60a89bf5016d21f267a67a66e948018d7b443beaae6f97b334c6c07"] }


Less details
source code | moneroexplorer