Monero Transaction 0ef68ff34e03f02b462c3cee651f0848b28854a1c58535a1970afc4150ba3bf8

Autorefresh is OFF

Tx hash: 0ef68ff34e03f02b462c3cee651f0848b28854a1c58535a1970afc4150ba3bf8

Tx public key: a318e2b96dde34d277d2becbe89598d1c3c2abfe18cac7a74fc557d017ab30a9
Payment id (encrypted): d4f6e4d879b71bcc

Transaction 0ef68ff34e03f02b462c3cee651f0848b28854a1c58535a1970afc4150ba3bf8 was carried out on the Monero network on 2020-04-13 20:38:11. The transaction has 1234907 confirmations. Total output fee is 0.000030620000 XMR.

Timestamp: 1586810291 Timestamp [UTC]: 2020-04-13 20:38:11 Age [y:d:h:m:s]: 04:257:01:56:25
Block: 2076079 Fee (per_kB): 0.000030620000 (0.000012045670) Tx size: 2.5420 kB
Tx version: 2 No of confirmations: 1234907 RingCT/type: yes/4
Extra: 01a318e2b96dde34d277d2becbe89598d1c3c2abfe18cac7a74fc557d017ab30a9020901d4f6e4d879b71bcc

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: d11d044f517044b54992d0c1d2c50b3489d199db825e551e3877b8e71a98725f ? 16302678 of 122296602 -
01: fa5cad42c69c6ab7eba8984eea6f189342b6990ac0a3f4858972d7c6870413e7 ? 16302679 of 122296602 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 input(s) for total of ? xmr

key image 00: 8b5ff0de557b5a7f742b2d30818bbba0dc435636e473003e3dab525b65989c73 amount: ?
ring members blk
- 00: 958413e1374be462f6b1e892e66771eb4753727b97dbed95e73b845953a581a0 02053366
- 01: f95abdd74af2b1580f24f2246a006228493ccb3f02446e9f648dbaabb7f25244 02067409
- 02: 31f8e8d422f149e1a0e5133cd2a9dd3c89e8c19e5903302ddf19e509a6bafcb5 02067578
- 03: 45dee7a6822616c093816c7436c0a38f65c986d0a6315782ebca177a55858488 02068667
- 04: 55def109e854940f94503cabb40e034c71db014d2ebddc73666fc550ba601d8e 02074818
- 05: f5c2c3904c7b417b6f9cd29b2bc0055f51eccf1190f8ee2c75436e2e70bbf4c7 02074976
- 06: c237d6349c3930b27f810be033facd93ee1770bd3381f2f285cfd0d88416fff6 02075245
- 07: 2d70df873989090ac906576348bc1af2662605ae1dd902b77b40370889761195 02075735
- 08: 2702f324f3d4dcc8b91394f9955c4629da90c86f13f8782e298ce4c79fd16e81 02075926
- 09: 9e029c1b73944354a03601944d49ca1562127d52ea55c7b2bf665c24149b3e7f 02075951
- 10: e7119aae215fc4e0dce9cc9b138984cfec230c238efd7be91ce3ab44e367032f 02076041
key image 01: 78789c20a24b9a94e3402e848b6bd64353a1493726c2c2930285e61ea37460cc amount: ?
ring members blk
- 00: 0cd31dc67ae0e853f2ea0ce2427c2fa268f30bf92395acdbb4541c346b6a35d8 02027557
- 01: a2d02db659bce36ba5c9383d41a5eace5c62227148ab9a60409a2d435ea0e8c0 02050188
- 02: 5e10615019d5b477751bb180933273a4e7fc04ac7c4e85189ea358633f7a342e 02061175
- 03: 92d14ef3581dbd2dc918bd95acc1fedfe8b3a97c110969840535817f0049c6d5 02072658
- 04: 3efb9cc0c07f7a0cdff3d63bf97d6d4483437dd56d6644374b0ea50c9dd3a859 02074905
- 05: 5b63e9c64cc9b227f87e17e05e7f15eeed32c96cfa03dfe46f72d4049b4ae6f5 02075180
- 06: d250b2f31f17a288dc6a81bcded08935346185904942afe027b197205eae2923 02075926
- 07: 8bf101e4e019547d6fa30b14d3f7fd516a8707e453c0b3f9ff4adb4d067b479d 02075929
- 08: 7b7e0faf5eefc5dc38da3d39b7889d709ac6deb1849225c629858a348a5d21fd 02076022
- 09: a8a9bc549e07dadbb53a028c175bcf06611e72a376d47691fc18b2cd8d6e5127 02076023
- 10: 9481c5a022d062b92b7435fbd4f3d076afc1804ea834521ef4d67fbe9d077ecf 02076034
More details
source code | moneroexplorer