Monero Transaction d6b2af05f29900a201ee66a456c41b9e43cdc1f77fd8c338dca575167cf2e931

Autorefresh is OFF

Tx hash: d6b2af05f29900a201ee66a456c41b9e43cdc1f77fd8c338dca575167cf2e931

Tx prefix hash: 373fe65027131908dfdf224c07e9c8c47f98592e4099d3c5394b64b205577b77
Tx public key: 0befdc8412e2807468ef441e988dd00cde818038c691dbd68b354c01cfa1370e
Payment id: 5502ae18b72c8e227b294eda47809db4294979a1dde298dedb8bc430d4c0eb45

Transaction d6b2af05f29900a201ee66a456c41b9e43cdc1f77fd8c338dca575167cf2e931 was carried out on the Monero network on 2016-09-29 07:49:59. The transaction has 2214075 confirmations. Total output fee is 0.020000000000 XMR.

Timestamp: 1475135399 Timestamp [UTC]: 2016-09-29 07:49:59 Age [y:d:h:m:s]: 08:158:06:02:37
Block: 1146357 Fee (per_kB): 0.020000000000 (0.047517401392) Tx size: 0.4209 kB
Tx version: 1 No of confirmations: 2214075 RingCT/type: no
Extra: 0221005502ae18b72c8e227b294eda47809db4294979a1dde298dedb8bc430d4c0eb45010befdc8412e2807468ef441e988dd00cde818038c691dbd68b354c01cfa1370e

3 output(s) for total of 1.980000000000 xmr

stealth address amount amount idx tag
00: 94d82cfe81f84c9b3e1995d472a9e7286d850214c1ea6dce79e111a22810807c 0.080000000000 232053 of 269576 -
01: ed2848de33af6934c09d55161b60bf6689574066fb88dc4f13a4594c241b13d5 0.900000000000 402650 of 454894 -
02: e347d72098f3b1ab5471d9d26bf49738b6c163eb910b52bfc98bb77ff8c3956a 1.000000000000 806338 of 874630 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-01-20 23:49:47 till 2016-09-28 07:15:46; resolution: 3.63 days)

  • |_*_______________________________________________________________________________*_______________________________________________________________________________________*|

1 inputs(s) for total of 2.000000000000 xmr

key image 00: 65ecc93a390c266b731872ae7000fae2549a4f742b0238410eaa5cd98346b5cc amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7a7937ebe8e95fbe0b6c00985428297b6ebb676c1b3fa9581f479cee9da4df2a 00400814 0 0/3 2015-01-21 00:49:47 10:045:13:02:49
- 01: dd54a79f0398d3daeac0665878d0f4513ca0c2d42973ee58f7e8c41f92591e40 00818023 1 16/27 2015-11-09 03:56:31 09:118:09:56:05
- 02: 553207639d733e9c70e85d51eda7c23e9fcb29eca9d7220d4bc970af11c8a3ef 01145600 3 5/4 2016-09-28 06:15:46 08:159:07:36:50
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 2000000000000, "key_offsets": [ 230201, 74198, 97476 ], "k_image": "65ecc93a390c266b731872ae7000fae2549a4f742b0238410eaa5cd98346b5cc" } } ], "vout": [ { "amount": 80000000000, "target": { "key": "94d82cfe81f84c9b3e1995d472a9e7286d850214c1ea6dce79e111a22810807c" } }, { "amount": 900000000000, "target": { "key": "ed2848de33af6934c09d55161b60bf6689574066fb88dc4f13a4594c241b13d5" } }, { "amount": 1000000000000, "target": { "key": "e347d72098f3b1ab5471d9d26bf49738b6c163eb910b52bfc98bb77ff8c3956a" } } ], "extra": [ 2, 33, 0, 85, 2, 174, 24, 183, 44, 142, 34, 123, 41, 78, 218, 71, 128, 157, 180, 41, 73, 121, 161, 221, 226, 152, 222, 219, 139, 196, 48, 212, 192, 235, 69, 1, 11, 239, 220, 132, 18, 226, 128, 116, 104, 239, 68, 30, 152, 141, 208, 12, 222, 129, 128, 56, 198, 145, 219, 214, 139, 53, 76, 1, 207, 161, 55, 14 ], "signatures": [ "057c375e609988cf6deb6e56856aff90323f1288af54303672c477bf533bfd06c159950581f54b5d7e55d7af366118bd96398898a5e984b9217903953a69f105eafbfc39d36f5c2e26a40c943ffc64806b69640ecfd2d9b1619d98ba3595550accda8d418465b7cf67a975691ca68e33de181de9b2b2fcc6a7bfeae41802f601797397f1991ccb575d8da5f55d20ee9ec71e6435610686f191a0d68deb99970624e38199ba08c2cb46b47c96641fbebdbac639380bfcdd9cb0bc48cb3cd5180e"] }


Less details
source code | moneroexplorer