Monero Transaction 6e56abbc52158558f1167f7c8a40be9dd8e1cee9134e4da41e4cbc054e1b281d

Autorefresh is ON (10 s)

Tx hash: 6e56abbc52158558f1167f7c8a40be9dd8e1cee9134e4da41e4cbc054e1b281d

Tx public key: 9f907c2f42fa567888a8fcd4475a112db84d4325b3ad34a818e3d23c621e4778

Transaction 6e56abbc52158558f1167f7c8a40be9dd8e1cee9134e4da41e4cbc054e1b281d was carried out on the Monero network on 2014-07-17 13:43:30. The transaction has 3109479 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1405604610 Timestamp [UTC]: 2014-07-17 13:43:30 Age [y:d:h:m:s]: 10:068:20:05:45
Block: 132784 Fee (per_kB): 0.010000000000 (0.016569579288) Tx size: 0.6035 kB
Tx version: 1 No of confirmations: 3109479 RingCT/type: no
Extra: 019f907c2f42fa567888a8fcd4475a112db84d4325b3ad34a818e3d23c621e4778

7 output(s) for total of 4.990000000000 xmr

stealth address amount amount idx tag
00: 268920a12f1ed5c084d7685838d850ce6ad312f8b8decd5e341dddf732c9d37b 0.090000000000 82643 of 317822 -
01: 61963b0c08e402d6bb4b4571acf8f6fb51fb8479737951a263520fbd60b3a82e 0.100000000000 286382 of 982315 -
02: 4d5240f27aee326beb41c2980ddac71949b4fda162884539397441e563b6219c 0.100000000000 286383 of 982315 -
03: 537e1ec580a9185a82048009ef17ca95a7fb932220c72e18568ce839095bd82b 0.200000000000 211103 of 1272210 -
04: ee7ecf12cab7ff8d98d03c4ba2d4401d4f84845b6ae31d63ff7104994249859d 0.200000000000 211104 of 1272210 -
05: 41df33cc7835cb74fe0403ac6a88138bef1f30f1a2d27d52391ed39db5cc6f1f 0.300000000000 104408 of 976536 -
06: 2e36cfb38f0d3bc71fc87827813f3298a27083fd73b357730c57c2f25e20be8f 4.000000000000 24081 of 237197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



1 inputs(s) for total of 5.000000000000 xmr

key image 00: b266683f45b5cf5048be75e1eec9a57de506fbd31d11f1f1759f1afd84cbd9c7 amount: 5.000000000000
ring members blk
- 00: e59054fabe7d625605781b333520741715e97f055a28344ab7151ca62228758b 00100769
- 01: c0376a93cef899d11710a77e87b4e7befa75226561b4671f1ac4c0d4cf3f1610 00108900
- 02: 880afbdc1d46fbcd8d3d527bac427c907b16a39a5b43bb803fc165e99826dc3c 00111140
- 03: 6784fd143e32bacf52784dc0f4c070881e0da6f413f9d480cd3313c240e2e637 00129114
More details
source code | moneroexplorer