Monero Transaction 6dd9410341c08945f66d596fbfd66278bd1fcd0e20609e572e30b3781da3fe0e

Autorefresh is OFF

Tx hash: 6dd9410341c08945f66d596fbfd66278bd1fcd0e20609e572e30b3781da3fe0e

Tx public key: 06988162c55442e2d0abe60124ab3ca00ac2ce5b1bf8bfd9d7a527f6fadd5f75
Payment id: a39c1a325193f6a1e12f8d0596d081a3295d9dc97c49267f550d7d0c15f02d35

Transaction 6dd9410341c08945f66d596fbfd66278bd1fcd0e20609e572e30b3781da3fe0e was carried out on the Monero network on 2016-12-28 14:19:47. The transaction has 2080067 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1482934787 Timestamp [UTC]: 2016-12-28 14:19:47 Age [y:d:h:m:s]: 07:337:04:51:19
Block: 1211410 Fee (per_kB): 0.010000000000 (0.013061224490) Tx size: 0.7656 kB
Tx version: 1 No of confirmations: 2080067 RingCT/type: no
Extra: 0106988162c55442e2d0abe60124ab3ca00ac2ce5b1bf8bfd9d7a527f6fadd5f75022100a39c1a325193f6a1e12f8d0596d081a3295d9dc97c49267f550d7d0c15f02d35de2035efd259a9583e8243e2b5555f518d605dce89bd67b1975eb33a678a6ac2f1ab

5 output(s) for total of 8.998000000000 xmr

stealth address amount amount idx tag
00: 50ff1ef584caccfcda70ae34dff5a95246e22391cc2a88e14d7ef129efb3ca72 0.008000000000 230672 of 245068 -
01: d1f0b503ac7b54e91d627f7dda2a7c2dc9669d3b77ae49e364f85c927b050c17 0.090000000000 301432 of 317822 -
02: ff33452a7bd4e258bf121f01a6532545462cc13f89a4c3032edd53b949d1c769 0.100000000000 963724 of 982315 -
03: ccd7295e241c825a00aefcd6018eaed689cca0391c0b064811a9a62baa0b74d9 0.800000000000 480535 of 489955 -
04: 8310736e761309777d6d82ddf2acc9a146903f536bb0d78f9af88a461bf543d7 8.000000000000 220334 of 226902 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 9.008000000000 xmr

key image 00: fde95e1588b4a23948076e36bf76b934cde60e0cad50cbc081d0ff589f7b3900 amount: 0.008000000000
ring members blk
- 00: 2bf74867f1cdee2eaa938a5a589948cc846bce9b65ed0893e0f4bd608165dd0a 00061159
- 01: 2e1cfed6e598a423dc975db6ab78d2807986dfa77e7f3f74f2257acabe054cad 00082199
- 02: 21493cede0ff5fdda4f911fa7656b9092d66dff2e5fbc64b62f7693faf762e4f 01211229
key image 01: c1f17b416339d116622b8e51fb0785371456b34cf78da7ef8f985336c307ea4f amount: 9.000000000000
ring members blk
- 00: 883272912a3a60c9e375c4f4d118113a9cc40adeac75e94894b403c56299e6a3 00635365
- 01: 18512ef7e6e9bae26dd0bb7c73af07b00549153af094f34083e67fc6a0f4522d 00670745
- 02: 6b889628f41b5904485c21aa687b6389eb5f5498a7c350ec94505f73259e181d 01211403
More details
source code | moneroexplorer