Monero Transaction 6df7e2fa5eaa9e54d08585fa12cf7b8a8920649419b30da0f6f7f22058a74fb6

Autorefresh is OFF

Tx hash: 6df7e2fa5eaa9e54d08585fa12cf7b8a8920649419b30da0f6f7f22058a74fb6

Tx prefix hash: 7d305147cc340391376b02633add26bad04610a6f90b26be240c115969c0b618
Tx public key: f7633f05e34e475759d302b5a36cd31afcf757549fbde655035a29453a824f65

Transaction 6df7e2fa5eaa9e54d08585fa12cf7b8a8920649419b30da0f6f7f22058a74fb6 was carried out on the Monero network on 2015-03-12 20:59:33. The transaction has 2829212 confirmations. Total output fee is 0.030000000000 XMR.

Timestamp: 1426193973 Timestamp [UTC]: 2015-03-12 20:59:33 Age [y:d:h:m:s]: 09:279:20:49:05
Block: 473669 Fee (per_kB): 0.030000000000 (0.042024623803) Tx size: 0.7139 kB
Tx version: 1 No of confirmations: 2829212 RingCT/type: no
Extra: 01f7633f05e34e475759d302b5a36cd31afcf757549fbde655035a29453a824f65

2 output(s) for total of 1.050000000000 xmr

stealth address amount amount idx tag
00: d25a3e55c232e5130ed723184c05b7cab8a0ab50ce041ea2b90bb7653d61769d 0.050000000000 143778 of 284522 -
01: 1a05110068384281338797e6097ad17e7deddc0806f36e5cf9a9f56891678600 1.000000000000 489893 of 874630 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-13 05:49:57 till 2015-03-12 20:25:58; resolution: 1.60 days)

  • |_**_________*____________________________________________________________________________________________________________________________________________________________*|
  • |__________________*___*__________*_______________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 1.080000000000 xmr

key image 00: e2956c4a80dc08a955dd316c0dc31de6e1ad6609f0917c20364a446045df33e8 amount: 0.080000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7140257b4bf00acd36b552d3c88cec791e896bafe6d22cd4105e5c534b73ef30 00083087 1 7/140 2014-06-13 06:49:57 10:187:10:58:41
- 01: 1fd29c92821773be5d253eee077a5c632fcec319e48ae7123e735b97ac2144a3 00087809 1 4/30 2014-06-16 11:09:42 10:184:06:38:56
- 02: cf8d0bb2d637df1b15806d543fba3747da9a5296e2cc8bd885b57243f45ee8ea 00109652 0 0/6 2014-07-01 12:28:47 10:169:05:19:51
- 03: 77f18b4027781685ad8a0049f48a97281e0a294ececfe5236d46e46b831c6a3c 00473599 4 1/5 2015-03-12 19:25:58 09:279:22:22:40
key image 01: a5ccfaaeaeb3148b06d5127337b5837b9ccdce7075eb95fb45441c9f30d44b72 amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: bce3b56d80f436298211ba281146a34b4af9df491d5c5ee909f9334764c954e8 00123742 1 1/4 2014-07-11 08:13:39 10:159:09:34:59
- 01: 125df1d37c2a76a396c022a0e83ecc193b054414abbc78604810c365a80e170a 00134108 1 11/40 2014-07-18 11:30:47 10:152:06:17:51
- 02: bdc5373cf3fbac2259f7035f00a111a02f3a310636ac320abebf1cc5077af732 00159887 5 36/88 2014-08-05 09:24:10 10:134:08:24:28
- 03: e6fa9321684f35a8aed0c8b92d7a01f7af03e13488f563d71169d969a1e5d4b0 00473330 0 0/5 2015-03-12 15:07:52 09:280:02:40:46
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 80000000000, "key_offsets": [ 42257, 12232, 18813, 46290 ], "k_image": "e2956c4a80dc08a955dd316c0dc31de6e1ad6609f0917c20364a446045df33e8" } }, { "key": { "amount": 1000000000000, "key_offsets": [ 92864, 20378, 53821, 322370 ], "k_image": "a5ccfaaeaeb3148b06d5127337b5837b9ccdce7075eb95fb45441c9f30d44b72" } } ], "vout": [ { "amount": 50000000000, "target": { "key": "d25a3e55c232e5130ed723184c05b7cab8a0ab50ce041ea2b90bb7653d61769d" } }, { "amount": 1000000000000, "target": { "key": "1a05110068384281338797e6097ad17e7deddc0806f36e5cf9a9f56891678600" } } ], "extra": [ 1, 247, 99, 63, 5, 227, 78, 71, 87, 89, 211, 2, 181, 163, 108, 211, 26, 252, 247, 87, 84, 159, 189, 230, 85, 3, 90, 41, 69, 58, 130, 79, 101 ], "signatures": [ "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", "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"] }


Less details
source code | moneroexplorer