Monero Transaction b6fa2d42396f9b193c5ff4cb8e8dd57393b36ba1a3507a088392912fa61acca6

Autorefresh is ON (10 s)

Tx hash: b6fa2d42396f9b193c5ff4cb8e8dd57393b36ba1a3507a088392912fa61acca6

Tx public key: 85d668c2a3df2c27e2e978f5814380c036cd4d421916fadec73172517398a5f0
Payment id (encrypted): 0b5e54beba45eee2

Transaction b6fa2d42396f9b193c5ff4cb8e8dd57393b36ba1a3507a088392912fa61acca6 was carried out on the Monero network on 2020-04-09 02:07:44. The transaction has 1219390 confirmations. Total output fee is 0.000030870000 XMR.

Timestamp: 1586398064 Timestamp [UTC]: 2020-04-09 02:07:44 Age [y:d:h:m:s]: 04:235:10:24:32
Block: 2072620 Fee (per_kB): 0.000030870000 (0.000012125386) Tx size: 2.5459 kB
Tx version: 2 No of confirmations: 1219390 RingCT/type: yes/4
Extra: 0185d668c2a3df2c27e2e978f5814380c036cd4d421916fadec73172517398a5f00209010b5e54beba45eee2

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: 58f47537bf7b807a6d3ebcc4151d0bb7828897035f4d482076e7d217d26776ad ? 16178884 of 120453556 -
01: fce81373b498bebb10edc2b8e232e06a1e73bd7fffc1546ce0a6eb3d77afa1c1 ? 16178885 of 120453556 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 input(s) for total of ? xmr

key image 00: 8d21d3aa5abd423e4a69b219665c249f5b75654b642656becceadd74e3b4b7c3 amount: ?
ring members blk
- 00: 018f296a95b811e9f24f27d6d3ee3615a737ff318373d1ea630f294726342d83 02026528
- 01: c728f95ecd44e239c7861823a592537d3c4d5e092d753050d2dc92e6b63f6728 02041669
- 02: 6b084812f55244461b016d1e85f0f7650e5c2f8b8024016ee87d5fad12fd9a0c 02067089
- 03: e32456e20f9891164e9e0384f13c4a2e36f0e27b93279c16935e29323ce4b41b 02071274
- 04: b017d2486cdae65953e475e884e1be248b407871c81987df915d2ba51c34331d 02071429
- 05: 07a382f627b954b628a229657b680aa8b70c2e59c1c193c469cf795c2db56c53 02071539
- 06: 4d44ddd58376a0f8d88a80848f58025d7905fbe8ad0cc8e89dcf3a271b861366 02072446
- 07: c45a4e41c31261a1d3a88dc98c4f56fdb40fb53643357bc08250f52a60b68777 02072496
- 08: f16a537951a7665fbc292cf0fdb28e40792c02dc4ed9f9825979023ddc9cb991 02072561
- 09: ecfaa7fe6b4da0edc7c452b105e3e4722c833046261384f69ac64b3d345f3a6c 02072600
- 10: 42f94bbbd0c474bcfdb42a46250de18825ba8f4cf2e8ac7a3478e754a94e0a9e 02072603
key image 01: 0619aeba2dcd6561e537b6fbf037fbf0053b15bb01f734b38afdab1f7cade8b0 amount: ?
ring members blk
- 00: ae0c38a3c9934624df6810e399a0fb63336724f58bb15d44f101c0013f1d68c5 01881785
- 01: 66e97a18b13816a3cb13fa005282a50a12c27770e9cb124e5b27e66855e0f16e 01896477
- 02: dfa956c7c68d41ba88a0c60638d36e118f3609b14ba4d8f557a6d7ff934a1184 02000591
- 03: cf16efcb5d9c3e3ede6c8be94ce2aa6ea973be8521e4d305f26e4e7efcdc86c8 02011721
- 04: 90f1bf45b6d3c7c70dba00cae4a38ae60172656d64319692927a1175e8a9d39f 02047197
- 05: 291f0db35e4383896ad366b336272432fd6592fec7c5c7231925db9f86521cbf 02050307
- 06: d5a4f2f1d56cd315e5cfa9ee445c8f23770736c4268d6e0db32e542bcc898e60 02071842
- 07: 050849717250f65d8735f52147d84810594f719ed77f33a3d085f3c1ed150687 02072387
- 08: aaa345b0882daa2a818dd31b0cd1ddb7045777c8718f6f03cc1c1dafffde20d9 02072472
- 09: 28a9c2fd5a51ab0877db87e92f340d63de4e2a7a0fe1a5b08286a252a2146d03 02072600
- 10: bc70009b12537537712cc81533fd236edeb555f73317989be60d3e8cde49370f 02072607
More details
source code | moneroexplorer