Monero Transaction 6d6743982094d4e34812c0009746bad67f34dd6fabee3f94bd1492be4776c14d

Autorefresh is OFF

Tx hash: 6d6743982094d4e34812c0009746bad67f34dd6fabee3f94bd1492be4776c14d

Tx prefix hash: b0c6372aa76b819910544cfa196cdd3455bfe28774dbbcaee08c8caa372b8883
Tx public key: 651f33d5862fb3d1b2b818be0f9311e305906229897b77e68495a58f438231e6
Payment id: aa28b772a0574d7598d294470d8b84f39b9a5c40831d4d2586c0a390b8c29492

Transaction 6d6743982094d4e34812c0009746bad67f34dd6fabee3f94bd1492be4776c14d was carried out on the Monero network on 2016-09-13 05:39:56. The transaction has 2154795 confirmations. Total output fee is 0.020000000000 XMR.

Timestamp: 1473745196 Timestamp [UTC]: 2016-09-13 05:39:56 Age [y:d:h:m:s]: 08:076:00:11:07
Block: 1134812 Fee (per_kB): 0.020000000000 (0.027270306258) Tx size: 0.7334 kB
Tx version: 1 No of confirmations: 2154795 RingCT/type: no
Extra: 022100aa28b772a0574d7598d294470d8b84f39b9a5c40831d4d2586c0a390b8c2949201651f33d5862fb3d1b2b818be0f9311e305906229897b77e68495a58f438231e6

5 output(s) for total of 5.480000000000 xmr

stealth address amount amount idx tag
00: 9741d9a6af3a45c73029bd6ed46ee4bd34206af52dcc03b4efe13832a94d8e61 0.080000000000 226388 of 269576 -
01: dd066ac6ff3fdcc7e90154781f6c4d244a116d502cfdbced39d6a22ce4b97773 0.600000000000 602456 of 650760 -
02: 2ca4913ef5b69079197ac72beeb97846a5cd9a57ff710d2e0d3c36610db1b318 0.800000000000 444122 of 489955 -
03: 9e017a0b36792c0ec53368d6776e6136f4ab95f671a4bc3b51d6b1f14fe66119 2.000000000000 397714 of 434057 -
04: 6be9c75a89232162e304179d680fac341e5d749705396269337b70a2c21e767c 2.000000000000 397715 of 434057 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-27 09:29:10 till 2016-09-12 22:36:15; resolution: 4.58 days)

  • |______*____________________________________________________________*_____________________________________________________________________________________________________*|
  • |_*__________________________________________________________________________*____________________________________________________________________________________________*|

2 inputs(s) for total of 5.500000000000 xmr

key image 00: 5f175d1e6e1acc3794f7bf121f94df253101c3a0b4ad9028000d6a0e8ec97e8d amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ceffcbba9b62d2f06bb70a4c30776afb36dda91b79c40c992cf7a4aa9af00568 00181497 3 19/58 2014-08-20 11:02:04 10:100:18:48:59
- 01: 124a144584e68ec24d3e81e6e540d278d0b6e3dc7a56a892e8b5c44cfa136af8 00584616 4 6/10 2015-05-29 10:22:48 09:183:19:28:15
- 02: fcc5935ad40e99d23dcc608d731d19e8776d676d5366198e8d287044328b9f29 01134635 3 4/5 2016-09-12 21:36:15 08:076:08:14:48
key image 01: 5162ceff7195addce45af42f95db74bced9e129130ea59437ee40be1bc61d9e0 amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7832d2720be57e27c405046293d0e2aab40e61db1c26c97d157f94f1e068bee1 00147046 0 0/5 2014-07-27 10:29:10 10:124:19:21:53
- 01: 94745df39b09b2abb010772b49443b72b743761c3b66331a970b4b8bc2de6caf 00644570 1 168/5 2015-07-10 09:06:06 09:141:20:44:57
- 02: 0d74aa07e5b32650ec4b06eeb856636dee4c86502fc331225fcc92aa4117b509 01134099 3 16/57 2016-09-12 04:46:44 08:077:01:04:19
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 500000000000, "key_offsets": [ 239554, 526144, 277604 ], "k_image": "5f175d1e6e1acc3794f7bf121f94df253101c3a0b4ad9028000d6a0e8ec97e8d" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 74559, 102221, 48763 ], "k_image": "5162ceff7195addce45af42f95db74bced9e129130ea59437ee40be1bc61d9e0" } } ], "vout": [ { "amount": 80000000000, "target": { "key": "9741d9a6af3a45c73029bd6ed46ee4bd34206af52dcc03b4efe13832a94d8e61" } }, { "amount": 600000000000, "target": { "key": "dd066ac6ff3fdcc7e90154781f6c4d244a116d502cfdbced39d6a22ce4b97773" } }, { "amount": 800000000000, "target": { "key": "2ca4913ef5b69079197ac72beeb97846a5cd9a57ff710d2e0d3c36610db1b318" } }, { "amount": 2000000000000, "target": { "key": "9e017a0b36792c0ec53368d6776e6136f4ab95f671a4bc3b51d6b1f14fe66119" } }, { "amount": 2000000000000, "target": { "key": "6be9c75a89232162e304179d680fac341e5d749705396269337b70a2c21e767c" } } ], "extra": [ 2, 33, 0, 170, 40, 183, 114, 160, 87, 77, 117, 152, 210, 148, 71, 13, 139, 132, 243, 155, 154, 92, 64, 131, 29, 77, 37, 134, 192, 163, 144, 184, 194, 148, 146, 1, 101, 31, 51, 213, 134, 47, 179, 209, 178, 184, 24, 190, 15, 147, 17, 227, 5, 144, 98, 41, 137, 123, 119, 230, 132, 149, 165, 143, 67, 130, 49, 230 ], "signatures": [ "a2fe13a22938183ae4b99922c044d5bafcbeee008aa831b972004001d30a4f0698fdf8cacb62bedec49d8df5d4dbdb40e00116250c4be08e9886f4710c67ec05e6b4e91a9ee8c665c6e0bf6318e7b3259033d4b8bc1b8caaebce25923ae0ec032bc1ba05bf882c60411743e327cd5c408137fcd0d299efc6e1b7e6b6f5c930019aaf196cfca8ffdb42eef641301f5b64471dfb0aa5fde42719e2dd74fc4b1104788183f0491c3224c8947934ab269139412ecd247a14d7041e821db1712f6805", "bfb92acca31255cd00aab715bc8014f9408f93b90ab48fe0f6dc5978bfd58a0dadbed5551c8f7d02c172b80455e5b07075f2feeb249f04c3c76953cabb0d5a0e283d87ba4f3eaf80c29760a24825040bbcb2bb00f0e282bf979bc4135654390bf4a94f7335d6a3a4013f8eb509e7c2acf76e0f18d7fbb39ba3e90282b8e7ef043a13b2a93fb3dd5bbccee13c67fd48008b7a8fed21b64a999af4ef632cbcff0363e401db72d1bd5fbfbdb447052a1c6d87e665eeeb418b7749de91a6b9f70c0f"] }


Less details
source code | moneroexplorer