Monero Transaction b6e80dabe164286399a18d7a4ed33d1b72d2a7d4ea5dde14d28fad4c0cb9ac05

Autorefresh is OFF

Tx hash: b6e80dabe164286399a18d7a4ed33d1b72d2a7d4ea5dde14d28fad4c0cb9ac05

Tx public key: 1598e34cad991d0b2b7cf0d7b2be550b49a68bbe6687d87685815e4f209be199
Payment id: d4410e902528efa87687df756125cfbdbaccaa83e579ae9766cd3436becb54ab

Transaction b6e80dabe164286399a18d7a4ed33d1b72d2a7d4ea5dde14d28fad4c0cb9ac05 was carried out on the Monero network on 2014-07-30 16:22:06. The transaction has 3137134 confirmations. Total output fee is 0.008002120000 XMR.

Timestamp: 1406737326 Timestamp [UTC]: 2014-07-30 16:22:06 Age [y:d:h:m:s]: 10:120:09:50:15
Block: 151692 Fee (per_kB): 0.008002120000 (0.012548500582) Tx size: 0.6377 kB
Tx version: 1 No of confirmations: 3137134 RingCT/type: no
Extra: 022100d4410e902528efa87687df756125cfbdbaccaa83e579ae9766cd3436becb54ab011598e34cad991d0b2b7cf0d7b2be550b49a68bbe6687d87685815e4f209be199

6 output(s) for total of 10.891997880000 xmr

stealth address amount amount idx tag
00: d194c4ad9cd1235b306dd87af610a517fa9ed718504d2b28e66203b4383a4de7 0.001997880000 0 of 2 -
01: 993c8bf6c5c984eefc526047b31a3d8e42bab18c30b00e844b17b9eafd0bb6dd 0.030000000000 154655 of 324336 -
02: ea0136516564be5ec16c82b78ba0436706e809b30fbb48899bbba5e313906f51 0.060000000000 98222 of 264760 -
03: b9080f5bcdd622bcc0101dc5dc9dfbd9848d83e201b69797dd389a2bcd7b4047 0.800000000000 91252 of 489955 -
04: 057a4720072c5e10a7ce45b1a0637acea48297602670b60b581aae58bd90c943 1.000000000000 150725 of 874629 -
05: 0b62f3d2bd708ca172ef339e74ad0898879f63e1012fcaf44c24aee36bf1e9c6 9.000000000000 13492 of 274259 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 10.900000000000 xmr

key image 00: 834e2169ed13146d47d76d765ea0653763a72854b7e0315cb544f1029cf8da01 amount: 0.900000000000
ring members blk
- 00: 609111c69d3dfbd2cea81a6c7bea5f6476418ff5adbaac4e1864573f3d606c3e 00032948
- 01: d1af04d5bc0946381a5ce9c5281c77fe1a27a7889b24e75995e16618361a078c 00151660
key image 01: ed1c7a966bc016cf09732cafe80725baa43ab1d1672bc92b398bf50e07152c21 amount: 10.000000000000
ring members blk
- 00: 8149f9dc875bc70154bebd62864ba8491f337af109fe8cfb0e0c5dfc3475bfa2 00008265
- 01: ed7504644ffd319db612a3f17f94d27700021c9008a1ec352a21a41e11f2126e 00151541
More details
source code | moneroexplorer