Monero Transaction 6ffbad5f46e52d00f308a57659272b32db3c7a47acead460eb5b613133eee02c

Autorefresh is OFF

Tx hash: 6ffbad5f46e52d00f308a57659272b32db3c7a47acead460eb5b613133eee02c

Tx public key: bf1a51702f269c61ed24ea15df113156496a89d8691b2b634e15ea57ca9c6f8f
Payment id: a0fefac932ac079b3999829e0ab2a9e21a813c6394aac63e8137571ef1d5edd4

Transaction 6ffbad5f46e52d00f308a57659272b32db3c7a47acead460eb5b613133eee02c was carried out on the Monero network on 2015-04-25 16:18:16. The transaction has 2824708 confirmations. Total output fee is 0.147830942769 XMR.

Timestamp: 1429978696 Timestamp [UTC]: 2015-04-25 16:18:16 Age [y:d:h:m:s]: 09:316:23:36:20
Block: 536477 Fee (per_kB): 0.147830942769 (0.178512836551) Tx size: 0.8281 kB
Tx version: 1 No of confirmations: 2824708 RingCT/type: no
Extra: 022100a0fefac932ac079b3999829e0ab2a9e21a813c6394aac63e8137571ef1d5edd401bf1a51702f269c61ed24ea15df113156496a89d8691b2b634e15ea57ca9c6f8f

6 output(s) for total of 22.652169057231 xmr

stealth address amount amount idx tag
00: 233efa07a750048dd7af6104abaa68a527fd034e5d9a89d0aaf584e7363242bc 0.052169057231 0 of 1 -
01: c26718bff1edad7664dc6873f524c196d939d22ce71665ec4824873e2d77a1b6 0.800000000000 282792 of 489955 -
02: 7a6b648653c513a451629845b2d1937ef888c97cc3fee5265dd631427505d1e0 0.800000000000 282793 of 489955 -
03: e2343424f0ab2c2dc36b2b7f31283ba846a7f44bafab70e796329272a65460ff 5.000000000000 162770 of 255089 -
04: 27d7023d007acdcb921171bea4ee3d2c496d39512f7c8eae61528d49bbb4972c 6.000000000000 107555 of 207703 -
05: aa5dbfc8ca3b1d67d1eb639984b18152887b407b652397f3d59ee0e2bdf0f42e 10.000000000000 614214 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



5 inputs(s) for total of 22.800000000000 xmr

key image 00: 9f9e4606f94ce75772fc2e595df0318322cf2cc71368567533c0cf8b5b5c37b6 amount: 7.000000000000
ring members blk
- 00: 6b2da2d76b59c13829eb2e2db68b1072b8b143848c12d982c99a713825aa8dcb 00535222
key image 01: b920e426d71b989b44df58b98927ea65c76f7d872de75fc4c314c4a301e5e26a amount: 0.500000000000
ring members blk
- 00: 1b3b9729e096e088ed5378c51a95979bf0d325e3f6d46064f3a0b3312297027d 00534633
key image 02: 74ddd92c29120fcf2ee92bac1568b57629869b862276d48c5622119444f8a82b amount: 0.300000000000
ring members blk
- 00: abf79f3871861ad07241a33a4872b9c6989162b4de92e07088501e66dd977cad 00535543
key image 03: 7460962a7912aceba6c0f2306df984f39f1bcc41b7661777d463a37eb5f7e82d amount: 7.000000000000
ring members blk
- 00: f4aae1f1ee662bc1be788d3ad6e126108e85a56bc3a523266de3074cff3f5a4a 00535887
key image 04: 5d4aed536a1397a519614697e31da6f277bf420034e1a023833406017fda2e82 amount: 8.000000000000
ring members blk
- 00: 12bcb027c4a58ad089b0036e0c06a55b26968b7959a6877aba170fd2885060be 00533581
More details
source code | moneroexplorer