Monero Transaction 6df02b0a013419d1faf637010ef14b474c3f2c981d96ea9411a0399717f0290f

Autorefresh is OFF

Tx hash: 6df02b0a013419d1faf637010ef14b474c3f2c981d96ea9411a0399717f0290f

Tx prefix hash: 27bc490a8da9e8342fcf63fa545a8b53d51713f6706e97b4f718679b85208b16
Tx public key: 13d5513162840b55b97d410684151880c4a353447f98a315a459ba6e809c32c2
Payment id: 5f36eba50e48fd123b81fc92a1788c21330bed5ebd2115736bb9d684c18dd5b0

Transaction 6df02b0a013419d1faf637010ef14b474c3f2c981d96ea9411a0399717f0290f was carried out on the Monero network on 2014-06-24 20:46:15. The transaction has 3178638 confirmations. Total output fee is 0.017000000000 XMR.

Timestamp: 1403642775 Timestamp [UTC]: 2014-06-24 20:46:15 Age [y:d:h:m:s]: 10:142:03:29:20
Block: 100040 Fee (per_kB): 0.017000000000 (0.025982089552) Tx size: 0.6543 kB
Tx version: 1 No of confirmations: 3178638 RingCT/type: no
Extra: 0221005f36eba50e48fd123b81fc92a1788c21330bed5ebd2115736bb9d684c18dd5b00113d5513162840b55b97d410684151880c4a353447f98a315a459ba6e809c32c2

7 output(s) for total of 200.030000000000 xmr

stealth address amount amount idx tag
00: 0a901de8fa356fa74f663cbc7e504f4a2d2da73651ee78a8ca4191a7ba26806c 0.040000000000 114225 of 294095 -
01: 3213a54c0eb6c8491fb74805b2d1e0d6e151a63b5116997e7f93f419c475ef34 0.090000000000 66914 of 317822 -
02: 898ca053374e0ae6782c8b0b785f96dbd2a140cbd7da994495388adf202923c5 0.900000000000 28237 of 454894 -
03: 8ae8890acd7067ec052e7cbee2bce5d2a480a73add99ef73b7fc82157c72c42c 9.000000000000 7726 of 274259 -
04: 8988e5e775b7197e9ffeaf00936c6acdee9eff9aed9f5801c799cb220a6f7069 40.000000000000 1278 of 41682 -
05: 38dc70127e5faa02073eb61bf727a3c00937756d1a7b3894b814b5851ff2646c 50.000000000000 1831 of 44703 -
06: bc4ce0af52a25913f1311fd6ba5663954938c2890b9096b694715793293066b4 100.000000000000 2209 of 57197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-02 05:22:02 till 2014-06-24 16:22:41; resolution: 0.13 days)

  • |_________________________________________________________________*________________________________________________________________________________________________________|
  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|

3 inputs(s) for total of 200.047000000000 xmr

key image 00: 07cddfa4a91abf06f4520fd6fd86fee5275d2c92049630c2d4120283a7a78da2 amount: 0.007000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d0b33d84c19c716cc40c77c5d8beeb53c4984afb90cbc6581575cd6bb960c0ce 00079476 1 3/73 2014-06-10 19:39:27 10:156:04:36:08
key image 01: 60a338fbe5d33ad0254b569aa5eef17e5fed927dc865e1d195a8323918a454cc amount: 0.040000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c5813380e8356bd7bf62caaeb824f972cd6bacf80a956df4c1c221d18221f0f1 00067188 1 31/7 2014-06-02 06:22:02 10:164:17:53:33
key image 02: 25bc9eb8b11147ff5e0b92c5ca6a4c9ba3cdd407e1d84e16817ee0ca7707e21c amount: 200.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4daf93db15c1a4ed2dd939cb71f5b32625d2ced9faee324203ee9eb7fdc16adb 00099729 1 4/7 2014-06-24 15:22:41 10:142:08:52:54
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 7000000000, "key_offsets": [ 75793 ], "k_image": "07cddfa4a91abf06f4520fd6fd86fee5275d2c92049630c2d4120283a7a78da2" } }, { "key": { "amount": 40000000000, "key_offsets": [ 25365 ], "k_image": "60a338fbe5d33ad0254b569aa5eef17e5fed927dc865e1d195a8323918a454cc" } }, { "key": { "amount": 200000000000000, "key_offsets": [ 1364 ], "k_image": "25bc9eb8b11147ff5e0b92c5ca6a4c9ba3cdd407e1d84e16817ee0ca7707e21c" } } ], "vout": [ { "amount": 40000000000, "target": { "key": "0a901de8fa356fa74f663cbc7e504f4a2d2da73651ee78a8ca4191a7ba26806c" } }, { "amount": 90000000000, "target": { "key": "3213a54c0eb6c8491fb74805b2d1e0d6e151a63b5116997e7f93f419c475ef34" } }, { "amount": 900000000000, "target": { "key": "898ca053374e0ae6782c8b0b785f96dbd2a140cbd7da994495388adf202923c5" } }, { "amount": 9000000000000, "target": { "key": "8ae8890acd7067ec052e7cbee2bce5d2a480a73add99ef73b7fc82157c72c42c" } }, { "amount": 40000000000000, "target": { "key": "8988e5e775b7197e9ffeaf00936c6acdee9eff9aed9f5801c799cb220a6f7069" } }, { "amount": 50000000000000, "target": { "key": "38dc70127e5faa02073eb61bf727a3c00937756d1a7b3894b814b5851ff2646c" } }, { "amount": 100000000000000, "target": { "key": "bc4ce0af52a25913f1311fd6ba5663954938c2890b9096b694715793293066b4" } } ], "extra": [ 2, 33, 0, 95, 54, 235, 165, 14, 72, 253, 18, 59, 129, 252, 146, 161, 120, 140, 33, 51, 11, 237, 94, 189, 33, 21, 115, 107, 185, 214, 132, 193, 141, 213, 176, 1, 19, 213, 81, 49, 98, 132, 11, 85, 185, 125, 65, 6, 132, 21, 24, 128, 196, 163, 83, 68, 127, 152, 163, 21, 164, 89, 186, 110, 128, 156, 50, 194 ], "signatures": [ "51964a8fb48dad25a498edc3dd9db36992d1074e312f0f1f9e5295406c6e6a079b323c41fdce0cb202783e3992018d00ad73bc7798304b008038fd87b68bd907", "7349757917fd8a237ec8c6264c7c52a1f7974b22c86351543a1f4e0c97c3ad0cf68da32a42cf2176dc3caef5623224d64e79742ea584fef312d419384d89c207", "6e9f7f5420ff76e51c2decc36af53ef94d1ae353012cb86123f139260e37fa0a658d1d133d3ef30d769e5f6c42021f8d242ddfe76637ad73c92a91a7419d6009"] }


Less details
source code | moneroexplorer