Monero Transaction 6dcefd2dddc5bb363376eb2392be355ec446620251b4ae8053c35292f34df29a

Autorefresh is OFF

Tx hash: 6dcefd2dddc5bb363376eb2392be355ec446620251b4ae8053c35292f34df29a

Tx public key: d7cb5a7a7707fb311252f349a6d4c5e06f79c0bf48e3804e7fdefd9d03489f6f
Payment id: 0a219d9a11898227bf7f1b4a988780b22592a18b83be06f8bf36e050e818c80d

Transaction 6dcefd2dddc5bb363376eb2392be355ec446620251b4ae8053c35292f34df29a was carried out on the Monero network on 2014-07-08 00:05:37. The transaction has 3172393 confirmations. Total output fee is 0.014670000000 XMR.

Timestamp: 1404777937 Timestamp [UTC]: 2014-07-08 00:05:37 Age [y:d:h:m:s]: 10:146:14:38:38
Block: 118947 Fee (per_kB): 0.014670000000 (0.028944277457) Tx size: 0.5068 kB
Tx version: 1 No of confirmations: 3172393 RingCT/type: no
Extra: 0221000a219d9a11898227bf7f1b4a988780b22592a18b83be06f8bf36e050e818c80d01d7cb5a7a7707fb311252f349a6d4c5e06f79c0bf48e3804e7fdefd9d03489f6f

6 output(s) for total of 7.990330000000 xmr

stealth address amount amount idx tag
00: 5ba3bb73daca85a320103fd58e4036a1c0f33cb12c87e3b9893ebfe12e3b84eb 0.000330000000 2116 of 2117 -
01: 4463c11dd43b2b30f95a478f3a45bc4d7f144c4be3faf8dfd3fd2bd73c603f5f 0.010000000000 311069 of 502466 -
02: 55ae0806f18ab0c460c972bd0494a553871180937b90b99c52434481056f6544 0.080000000000 75457 of 269576 -
03: a989bb4c21509362254eb57216400f2f0ca4a425dade34afbcfebd6f1a385ff3 0.300000000000 87999 of 976536 -
04: 4f039a38c60616f7fd4518494e29af2db36e32fa11c46784dabc51d058e83d67 0.600000000000 63617 of 650760 -
05: 3ab4ac514f3fd7a5e6fdf69ccf2fbee18481b89bec8a93446c89a3ca34645292 7.000000000000 43546 of 285521 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 8.005000000000 xmr

key image 00: bf04840278b524a6480698282a58f96466df9a067d494778f72b24b88f1e882e amount: 0.005000000000
ring members blk
- 00: 571a798d8c88d8c57ea61503e4b1dbf8c774479d23a06e7a80e947de8870fab5 00099979
key image 01: f35b6bf39afa43681391260eefce5f49de693c1444551840122658b6687acc2c amount: 8.000000000000
ring members blk
- 00: 8a66d030d001d0342b1a80bf82e0833facafc8adbbbcb31c585827c45c8dc1eb 00115502
More details
source code | moneroexplorer