Monero Transaction 6ef6fbd00899496836fe11f5649ef88f62f1f6e07d0b612b2cdd20fd2d63a2b1

Autorefresh is OFF

Tx hash: 6ef6fbd00899496836fe11f5649ef88f62f1f6e07d0b612b2cdd20fd2d63a2b1

Tx prefix hash: ff05b7a36a1d5e1183ebbfec0ae089d772752ec5dc19ed200efe2dcc86ed75a6
Tx public key: a8753f637b814f0600b80907dd611bcf97cb9cd6c2c12a9c5a42f04dec1a5836
Payment id: 2daa7eac55faf5e7ed4af038a8548cfe924b5f9e80e6e8c13bdb54088d32fed1

Transaction 6ef6fbd00899496836fe11f5649ef88f62f1f6e07d0b612b2cdd20fd2d63a2b1 was carried out on the Monero network on 2014-07-16 13:52:58. The transaction has 3171303 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1405518778 Timestamp [UTC]: 2014-07-16 13:52:58 Age [y:d:h:m:s]: 10:153:17:05:02
Block: 131262 Fee (per_kB): 0.005000000000 (0.006384039900) Tx size: 0.7832 kB
Tx version: 1 No of confirmations: 3171303 RingCT/type: no
Extra: 0221002daa7eac55faf5e7ed4af038a8548cfe924b5f9e80e6e8c13bdb54088d32fed101a8753f637b814f0600b80907dd611bcf97cb9cd6c2c12a9c5a42f04dec1a5836

5 output(s) for total of 2.295000000000 xmr

stealth address amount amount idx tag
00: 5f003a4c0347e58c632f170d7e031fe84840db3f3e51c36afbf7840967c1fdb3 0.005000000000 188943 of 308585 -
01: 3037128c8d8356b8f3395a8a737719606bdc478336e9370a36a649fc91cacbd2 0.040000000000 120655 of 294095 -
02: 4604b998c2a7a9b3fbc66d1ca567712f8f0950b8ec2a0ef9fbb1e978b443c651 0.050000000000 105200 of 284522 -
03: 34d3bc269cfa6a4c45754640cda88a01a379976d4dece4b6934c6473ee80e840 0.200000000000 205833 of 1272211 -
04: 2961ccf6ea8cc1b94e7a06e2604b10cd06bc103f3b862ec38984739c3459c424 2.000000000000 43662 of 434058 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-15 16:42:07 till 2014-07-16 10:42:44; resolution: 0.00 days)

  • |__________*_______________________________________________________________________________________________________________________________________________________________|
  • |_______________________________________________*__________________________________________________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |___________________________________________________________________________________________________________________________*______________________________________________|
  • |________________________________________________________________________________________________________________________________________________________________*_________|

5 inputs(s) for total of 2.300000000000 xmr

key image 00: 190880066bef1dfcc3ecb57849a8be1a06755d32f0f7be39e050a78410e171de amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a016b10a924aa1bfc39da32e05d1aa9c154e211d987b33b4702aea805b4410a5 00130023 1 30/76 2014-07-15 17:42:07 10:154:13:15:53
key image 01: 31b16e08a146bcfb68646fb9a04ad959b75a114c5ef34c4a64e6cc7fcc4727b0 amount: 0.400000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ea41f32a673e1ad1e963b2c825fe3ccdf036d6165ca94ad0a6f50eedf5a64dfc 00130258 1 17/40 2014-07-15 21:42:19 10:154:09:15:41
key image 02: 12824145880b26f8705eb3c1dbe4f534aa3f919ca931ecbc40245e4b392318a6 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 04403d455a8c426fa3e46d87a255823594b9d3072b0ab4d5e5ec7e55ee28238c 00130513 1 10/52 2014-07-16 01:42:22 10:154:05:15:38
key image 03: b23624d24446beb3234dfd34b40919ec2cb17437acd55d6069c87a72cad318e5 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9091b68469f16dce8afdcad0336ace173b3de5b89dbf307e87d1e05aa7f9d10f 00130759 1 19/61 2014-07-16 05:43:08 10:154:01:14:52
key image 04: ed3a02af035c89664b09dbc218d2f3ab74691d06cff8ee3c96ff7e454b562383 amount: 0.400000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d515c8e9a073898785145b1ae15477af96b5b61bddc726ab76d529a14c117e50 00131001 1 8/33 2014-07-16 09:42:44 10:153:21:15:16
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 500000000000, "key_offsets": [ 125737 ], "k_image": "190880066bef1dfcc3ecb57849a8be1a06755d32f0f7be39e050a78410e171de" } }, { "key": { "amount": 400000000000, "key_offsets": [ 87269 ], "k_image": "31b16e08a146bcfb68646fb9a04ad959b75a114c5ef34c4a64e6cc7fcc4727b0" } }, { "key": { "amount": 500000000000, "key_offsets": [ 127252 ], "k_image": "12824145880b26f8705eb3c1dbe4f534aa3f919ca931ecbc40245e4b392318a6" } }, { "key": { "amount": 500000000000, "key_offsets": [ 128022 ], "k_image": "b23624d24446beb3234dfd34b40919ec2cb17437acd55d6069c87a72cad318e5" } }, { "key": { "amount": 400000000000, "key_offsets": [ 88293 ], "k_image": "ed3a02af035c89664b09dbc218d2f3ab74691d06cff8ee3c96ff7e454b562383" } } ], "vout": [ { "amount": 5000000000, "target": { "key": "5f003a4c0347e58c632f170d7e031fe84840db3f3e51c36afbf7840967c1fdb3" } }, { "amount": 40000000000, "target": { "key": "3037128c8d8356b8f3395a8a737719606bdc478336e9370a36a649fc91cacbd2" } }, { "amount": 50000000000, "target": { "key": "4604b998c2a7a9b3fbc66d1ca567712f8f0950b8ec2a0ef9fbb1e978b443c651" } }, { "amount": 200000000000, "target": { "key": "34d3bc269cfa6a4c45754640cda88a01a379976d4dece4b6934c6473ee80e840" } }, { "amount": 2000000000000, "target": { "key": "2961ccf6ea8cc1b94e7a06e2604b10cd06bc103f3b862ec38984739c3459c424" } } ], "extra": [ 2, 33, 0, 45, 170, 126, 172, 85, 250, 245, 231, 237, 74, 240, 56, 168, 84, 140, 254, 146, 75, 95, 158, 128, 230, 232, 193, 59, 219, 84, 8, 141, 50, 254, 209, 1, 168, 117, 63, 99, 123, 129, 79, 6, 0, 184, 9, 7, 221, 97, 27, 207, 151, 203, 156, 214, 194, 193, 42, 156, 90, 66, 240, 77, 236, 26, 88, 54 ], "signatures": [ "a066c06dd47d307aba5a28b146315aea8dcb952d08d6f5ac55c59d6d4b90820922aacc20347f8f9453d9a28356fbe89eebe749f21117df1a712166501ca30402", "963a50aff6a3ed53d589526631b9490d924f2b2f66ef101a0eb7d00a6a323000d1fb067081f085b86949b41cee330636872c172e370056dcdec1fd1a7b341404", "69534a6b4f5fd69f2ee035a0ca210a9b519a73a4b2d33333e1ecad1ea2118b0b88441024a470354fe09e5b21991f853bff4ce6300e253bdc89dcd1d41d5d580d", "37ce835c77a70e3c22504d00fc5d60a1b4a53ff05cec113d5095751f8dd0820eb472391a83621f50caa9c78c1db754b7a33770d94172a732945f28abb95dfa07", "3601fe6c7df836f69c3ff71be5344c85d1b037b0f32bdc3c99fd001da827b909e8cb5c8e132a366f8b0bd76f22968eb52b534851b7dc82ffe3b31029b3e7d300"] }


Less details
source code | moneroexplorer