Monero Transaction 6df94bc2bc6cd9033de6ba58334440518f7b8e88d3771cc448d18b0165658ff1

Autorefresh is OFF

Tx hash: 6df94bc2bc6cd9033de6ba58334440518f7b8e88d3771cc448d18b0165658ff1

Tx prefix hash: fe1e7ae0f7224f8f92c48e623eac83b140264e9b3184f1156e5e9a55582fbc2b
Tx public key: 4b5edb66b230aba9aeb15ede0ea8c2205a5ff1e154164990979e7c22b36a02dd
Payment id: c37cd33cd7671785e8137b6858ca0857c3d254d57cdf505010bdbbce57b9cc96

Transaction 6df94bc2bc6cd9033de6ba58334440518f7b8e88d3771cc448d18b0165658ff1 was carried out on the Monero network on 2014-06-24 20:40:02. The transaction has 3142447 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1403642402 Timestamp [UTC]: 2014-06-24 20:40:02 Age [y:d:h:m:s]: 10:091:20:56:52
Block: 100032 Fee (per_kB): 0.010000000000 (0.028054794521) Tx size: 0.3564 kB
Tx version: 1 No of confirmations: 3142447 RingCT/type: no
Extra: 022100c37cd33cd7671785e8137b6858ca0857c3d254d57cdf505010bdbbce57b9cc96014b5edb66b230aba9aeb15ede0ea8c2205a5ff1e154164990979e7c22b36a02dd

2 output(s) for total of 0.190000000000 xmr

stealth address amount amount idx tag
00: 88a8b0db7ec0f35222911fb3d4f63e64ad0a811ca2a1a3ec2f40f742adfffe8a 0.090000000000 66913 of 317822 -
01: 511371856f9f96ee366ee669bf9bed1ab4ed1dc8989dad31fa5f597dd889cdb2 0.100000000000 164202 of 982315 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-24 09:46:25 till 2014-06-24 21:01:56; resolution: 0.00 days)

  • |________________*_________________________________________________________________________________________________________________________________________________________|
  • |__________________________________________________________________________________________________________________________________________________________*_______________|

2 inputs(s) for total of 0.200000000000 xmr

key image 00: b8b59b98111a8810e524dc33f695f53cc3b7f0164361f30cd8b0e927816adb84 amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e6a00e2c96cb3c78de3afaccfff4dce8398b5e6899ca91fc2417793e4f944861 00099429 1 7/46 2014-06-24 10:46:25 10:092:06:50:29
key image 01: b5bf9ec2e6af707b3cd45140625209c062a379f5bdd64f4c8b0c65e970e15607 amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6a5dbb8a03146a0cc0f974c0abe48fa27850b7e4483f7259c0b57e122543ced3 00100002 1 9/51 2014-06-24 20:01:56 10:091:21:34:58
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 100000000000, "key_offsets": [ 159272 ], "k_image": "b8b59b98111a8810e524dc33f695f53cc3b7f0164361f30cd8b0e927816adb84" } }, { "key": { "amount": 100000000000, "key_offsets": [ 163953 ], "k_image": "b5bf9ec2e6af707b3cd45140625209c062a379f5bdd64f4c8b0c65e970e15607" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "88a8b0db7ec0f35222911fb3d4f63e64ad0a811ca2a1a3ec2f40f742adfffe8a" } }, { "amount": 100000000000, "target": { "key": "511371856f9f96ee366ee669bf9bed1ab4ed1dc8989dad31fa5f597dd889cdb2" } } ], "extra": [ 2, 33, 0, 195, 124, 211, 60, 215, 103, 23, 133, 232, 19, 123, 104, 88, 202, 8, 87, 195, 210, 84, 213, 124, 223, 80, 80, 16, 189, 187, 206, 87, 185, 204, 150, 1, 75, 94, 219, 102, 178, 48, 171, 169, 174, 177, 94, 222, 14, 168, 194, 32, 90, 95, 241, 225, 84, 22, 73, 144, 151, 158, 124, 34, 179, 106, 2, 221 ], "signatures": [ "3259171ed8080d5aad9cfd14800c0e63c915e27c5a7011b25daa9a4905b2370d7da4ca113e00aa2f1ada207133ae43a98eea2958ae28755fb780d332656a9008", "8bfd3da1ae8cdceb94cc1bfc86833976803478c93dc2d4ac6b737b67b229330e79ae2b3b055bf136fd4f4984db66f0617832eaad05281f3222ab50e43fe59706"] }


Less details
source code | moneroexplorer