Monero Transaction 6d503471100a7a96b6c222854b7ff870aa16a6933174d16b2b8c5bb280c2b80f

Autorefresh is OFF

Tx hash: 6d503471100a7a96b6c222854b7ff870aa16a6933174d16b2b8c5bb280c2b80f

Tx prefix hash: 92ca7f78837dcd6c769cc4f340f142527216cef7ba5facc732ad23862dc7485a
Tx public key: 816ddf0b8226de71ef58fbe7d26db2ff2a8a3413c1afe5883f44e97093b3c098
Payment id: 6df06c556ab2259eda99b4d7741c48d7c2aef95f9c9fc3e765017ba3113a15c1

Transaction 6d503471100a7a96b6c222854b7ff870aa16a6933174d16b2b8c5bb280c2b80f was carried out on the Monero network on 2014-08-04 00:38:50. The transaction has 3143000 confirmations. Total output fee is 0.005130570000 XMR.

Timestamp: 1407112730 Timestamp [UTC]: 2014-08-04 00:38:50 Age [y:d:h:m:s]: 10:132:22:02:04
Block: 157903 Fee (per_kB): 0.005130570000 (0.005583106993) Tx size: 0.9189 kB
Tx version: 1 No of confirmations: 3143000 RingCT/type: no
Extra: 0221006df06c556ab2259eda99b4d7741c48d7c2aef95f9c9fc3e765017ba3113a15c101816ddf0b8226de71ef58fbe7d26db2ff2a8a3413c1afe5883f44e97093b3c098

9 output(s) for total of 9.014869430000 xmr

stealth address amount amount idx tag
00: 68b4fd94375c86c81d45979070c5fdf0bc483bc0da00257ee23d6df6bab41f97 0.000869430000 0 of 2 -
01: 049b78e0659b0a9d5262d5728b7e2cdf773ee9df5d49271313056534760b00a6 0.006000000000 178380 of 256624 -
02: d7445ccade68c251b2f751a0b690524ff0503e2d33b3504f60e74bcf2dde6006 0.008000000000 162338 of 245068 -
03: 799449c1b0eed1e7f6602214f1142298381f393c20b60a24cd64003ebccf8bbb 0.050000000000 113497 of 284521 -
04: 0fe0d6e994898b447015fcc0604a26eb991a163bf334a174596de448eb2c7b32 0.050000000000 113498 of 284521 -
05: aa24d723f488aa100525050d94b22adf6f9bcedb92c175df402ca42fd04cff50 0.100000000000 366176 of 982315 -
06: d37672c023a40da51accc957ef31ff9e3e99951fdc5f979d8b445b8c7716ccb5 0.800000000000 97976 of 489955 -
07: 34dae4a419359a083a1e71cc11f381cf3cd902a4bb2f062263d94deeb1948a74 3.000000000000 39969 of 300495 -
08: b71d8329155544f4d0c68eda7dab3a01c155e6c3357c0ce76e0f92c04720e5fb 5.000000000000 87801 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-19 15:00:47 till 2014-08-04 01:14:54; resolution: 0.45 days)

  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |__________________________________________________________________________________*______________________________________________________________________________________*|
  • |______________________________________________________________________*__________________________________________________________________________________________________*|

3 inputs(s) for total of 9.020000000000 xmr

key image 00: 5a4b9e38d833fba088832ddd5f5451bc3cd94457de5dfe14fceceeb84d4d9ada amount: 0.020000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: cddc1b39bbb219b59e22b1d07467da95ff17bfadf06259d2fbf85f33de810180 00047104 0 0/9 2014-05-19 16:00:47 10:209:06:40:07
- 01: 2597372cc562b7c2f9280d911a004679546b73bc9cd7c9629430a03a1d5b15a6 00157876 2 2/7 2014-08-04 00:04:56 10:132:22:35:58
key image 01: 9772ba144d74b0556a37f58f9ff8edf04113188130b3f99b0a9ee2780e6c34d0 amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 07f9e71f4823e109c8afc59c4959e7a507e20239b0942ea4316e4181089dadb5 00100802 1 21/4 2014-06-25 10:32:50 10:172:12:08:04
- 01: 8685c2f59c60d9348afc840563e953c5270ea128d99d3059726838265acf36fa 00157886 2 15/154 2014-08-04 00:14:54 10:132:22:26:00
key image 02: fdbe9db59a0ed22e8a0d5516cf58e0efe63b13a9c3e8df9a8af249f7275080c2 amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: bfddbc63ffe2c1b10f6e4fff34288a7a9719b627b23dd8435b1c552db4025d61 00092986 1 7/169 2014-06-20 01:21:00 10:177:21:19:54
- 01: dec54d24082491cdb12fd37f9889d39fa42a89cd45a90e873a4cd130c3481683 00157783 0 0/5 2014-08-03 22:09:04 10:133:00:31:50
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 20000000000, "key_offsets": [ 5029, 203677 ], "k_image": "5a4b9e38d833fba088832ddd5f5451bc3cd94457de5dfe14fceceeb84d4d9ada" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 14367, 17665 ], "k_image": "9772ba144d74b0556a37f58f9ff8edf04113188130b3f99b0a9ee2780e6c34d0" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 15745, 71908 ], "k_image": "fdbe9db59a0ed22e8a0d5516cf58e0efe63b13a9c3e8df9a8af249f7275080c2" } } ], "vout": [ { "amount": 869430000, "target": { "key": "68b4fd94375c86c81d45979070c5fdf0bc483bc0da00257ee23d6df6bab41f97" } }, { "amount": 6000000000, "target": { "key": "049b78e0659b0a9d5262d5728b7e2cdf773ee9df5d49271313056534760b00a6" } }, { "amount": 8000000000, "target": { "key": "d7445ccade68c251b2f751a0b690524ff0503e2d33b3504f60e74bcf2dde6006" } }, { "amount": 50000000000, "target": { "key": "799449c1b0eed1e7f6602214f1142298381f393c20b60a24cd64003ebccf8bbb" } }, { "amount": 50000000000, "target": { "key": "0fe0d6e994898b447015fcc0604a26eb991a163bf334a174596de448eb2c7b32" } }, { "amount": 100000000000, "target": { "key": "aa24d723f488aa100525050d94b22adf6f9bcedb92c175df402ca42fd04cff50" } }, { "amount": 800000000000, "target": { "key": "d37672c023a40da51accc957ef31ff9e3e99951fdc5f979d8b445b8c7716ccb5" } }, { "amount": 3000000000000, "target": { "key": "34dae4a419359a083a1e71cc11f381cf3cd902a4bb2f062263d94deeb1948a74" } }, { "amount": 5000000000000, "target": { "key": "b71d8329155544f4d0c68eda7dab3a01c155e6c3357c0ce76e0f92c04720e5fb" } } ], "extra": [ 2, 33, 0, 109, 240, 108, 85, 106, 178, 37, 158, 218, 153, 180, 215, 116, 28, 72, 215, 194, 174, 249, 95, 156, 159, 195, 231, 101, 1, 123, 163, 17, 58, 21, 193, 1, 129, 109, 223, 11, 130, 38, 222, 113, 239, 88, 251, 231, 210, 109, 178, 255, 42, 138, 52, 19, 193, 175, 229, 136, 63, 68, 233, 112, 147, 179, 192, 152 ], "signatures": [ "b3be97b1ce786e9c30a8153fa97db9c05da0f4f3f18ed7b331edb639ca684c0b926e3f2ecc11fee3f7e5a102248b390447fbb1a51a8b9eeb514f08419bc268051a6fadc5cf76cbcebe08ac3f278be0f0922b049f907b2b7d1dc4ba0f5d9dcb0a6920e46c963ade7841a145a11118c044fe63f6cb402095dbbd324f6ae8ca0b0c", "553a3b833d6471c6a6cd96e618e946bceaff2ba841417b787a789b9b2dd978028e177b68dcbbcfbedcf7613c95ad1ce93a48c6196b15da8e6fe3242052f80d086cf2022864625107e23603b84b4390dbde69262cc278feebe5ddb6a74a50200c34a4ca9739a882097097ee34d25186925e4961083ea1fbfaf86551c9dab90301", "d8380a28e675cbe168b0824aa83d5f84c13c03054f4d47265d7f5b4e0ca75a0963015b1fb508c8092aa9b0fbf1f3fa3bdceff2dab3a03c811402ee471bfffd0d05f06d9d170baf8746bc8a458fd0288e7825addd7d2996b092732565be50e506e11de91cb8cf5c00c88b87ce435f6e2aca2631c37a0a4acbd6a9b6d3c0f81c0f"] }


Less details
source code | moneroexplorer