Monero Transaction 00d68e77d60bb4939edad2ad670fb40354b9cb66ac5a3ed7e9c9c95e5947aa68

Autorefresh is OFF

Tx hash: 00d68e77d60bb4939edad2ad670fb40354b9cb66ac5a3ed7e9c9c95e5947aa68

Tx public key: 003d0a6c400ecf96546b28b10b12a6364db4e9aa632dc17c73e45a70718a0630

Transaction 00d68e77d60bb4939edad2ad670fb40354b9cb66ac5a3ed7e9c9c95e5947aa68 was carried out on the Monero network on 2014-12-14 14:58:46. The transaction has 2946497 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1418569126 Timestamp [UTC]: 2014-12-14 14:58:46 Age [y:d:h:m:s]: 09:355:18:30:18
Block: 347583 Fee (per_kB): 0.010000000000 (0.009437788018) Tx size: 1.0596 kB
Tx version: 1 No of confirmations: 2946497 RingCT/type: no
Extra: 01003d0a6c400ecf96546b28b10b12a6364db4e9aa632dc17c73e45a70718a0630

9 output(s) for total of 2.890000000000 xmr

stealth address amount amount idx tag
00: a32478442465510f99c7a5dff31fa3e64225070dec2b7e1d2b6049807e4861e0 0.090000000000 126627 of 317822 -
01: 814d782cc4f09e6bf9e471ed2e1a2cca2d6ce8c0eeaac5cf4286aecd92f60afd 0.100000000000 671438 of 982315 -
02: c972252a7319e3ab601144368395141fed5ba9dc6f36d092cfbdd6c00b6f6f0e 0.100000000000 671439 of 982315 -
03: 661683e8ac9c0a1a4cd73d9f2f5d8a2bf12374a36beb19831b3b6b0cc8e877f3 0.100000000000 671440 of 982315 -
04: 134e34d0706bffe2772920914b2a313ab214e1432cccd7e153e467caa36bc405 0.200000000000 680155 of 1272210 -
05: cf82716fdea7e2895d93652088657a9b2b0b35dad3652d97b8f3d229f596e65d 0.300000000000 374965 of 976536 -
06: 6c030f50940ccac40a445d377be607b7e590a0868fdacf2b5c304aef182ebbdc 0.500000000000 519704 of 1118624 -
07: f588df73aecc2c96255f69a27543e1653445acf4af84a4f860ab9a173cdf862d 0.500000000000 519705 of 1118624 -
08: 67ce9598f9dc4de54f3dfaff36e86757d3d79e82506637322a76ea3853d8c944 1.000000000000 365501 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



4 inputs(s) for total of 2.900000000000 xmr

key image 00: 8e31787e728fcd69974594e520d81fed4ba35e2b9e0811c464f6062b291aecfd amount: 0.400000000000
ring members blk
- 00: 34ea024bd831bbf84d1c27c45b41fbb3431492376e30f255226ebb7370f34180 00119186
- 01: 65f252cffe7a4931887064fbc09d2d7d82e736614da0518355988578c0ecefa3 00347182
key image 01: c84f0d12f74be754d1a0f4fba220cdc2bf3206edec2124a3e1d0350f15d59194 amount: 0.400000000000
ring members blk
- 00: 5923a0ea444004d283daac958fc193315f36cddba6f26631b925e5787002aec9 00196664
- 01: e076da202cc0af41d87d5a4dbb7e83675799f4f832645f24f9794e03d56ed730 00347122
key image 02: cd93b0949d9e5e46caa65cf7ceeb37d417e4422ffdabe6dd6f90a3429fdee091 amount: 0.100000000000
ring members blk
- 00: 9c5ac690e00f14c60ad9ccb91cc242bfce52751b9072f3554f98063ed67bf9ca 00116123
- 01: 8ae3a77e4a660ae405027471b839ee2d1a8d31babb27d0e4f6d044d49bf36773 00346981
key image 03: eedf147e85d23e15d56a89503f96f28e52c17c19a8d61136214cc2d15f4d84d3 amount: 2.000000000000
ring members blk
- 00: 78a306b0ca9045626d7f716dc42fb863323185522b9236c7a8d90b3db5c4b556 00218628
- 01: 7a0d3272861f34bbad6597312fca4a60a1f3c19bd63378f3a0397b76248ef86c 00347182
More details
source code | moneroexplorer