Monero Transaction 468ad53941c45620c0edfce0a6d5f14c982041e8591c6e32f3f5874d38fb338e

Autorefresh is OFF

Tx hash: 468ad53941c45620c0edfce0a6d5f14c982041e8591c6e32f3f5874d38fb338e

Tx public key: 5afa1bbbf796b5fccbdb79ce10f3972f5e297277f746a7246936d6bd2c7db801
Payment id: 586351aeec22675577698c42284dfc391b6895c1a14ad77d8c381feb8eaaee6b

Transaction 468ad53941c45620c0edfce0a6d5f14c982041e8591c6e32f3f5874d38fb338e was carried out on the Monero network on 2014-08-19 21:42:19. The transaction has 3124178 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1408484539 Timestamp [UTC]: 2014-08-19 21:42:19 Age [y:d:h:m:s]: 10:122:12:08:11
Block: 180664 Fee (per_kB): 0.005000000000 (0.006080760095) Tx size: 0.8223 kB
Tx version: 1 No of confirmations: 3124178 RingCT/type: no
Extra: 022100586351aeec22675577698c42284dfc391b6895c1a14ad77d8c381feb8eaaee6b015afa1bbbf796b5fccbdb79ce10f3972f5e297277f746a7246936d6bd2c7db801

6 output(s) for total of 258.425000000000 xmr

stealth address amount amount idx tag
00: f3225acdaf32a77f3ce91be059e44daee1b268aa4d0bc02a8ea9917dfa48cb1b 0.005000000000 216173 of 308585 -
01: 2767ed03822e83e32e45ac4c454637cc8e8e0ebf0d68a1fb562027c4a9261e2e 0.020000000000 219319 of 381492 -
02: b6b9ac36b6ebe353a5125966df6f2cb81f30a0c017e3e88751370ce48f4d195e 0.400000000000 161359 of 688584 -
03: ae597464ce2dd5c87999ec513c7b8e10d959c0e04f10a40c2059146e5899a65c 8.000000000000 14889 of 226902 -
04: 48230b7a5308c055443133ffe52d6a5a2fc5da8ed0748d51c3ecaf39eb750e5e 50.000000000000 4310 of 44703 -
05: c0eb6a0ff0e5bf1666d52bd7c304a8e1435f38b3bf4093ceb65542b51d04eb6f 200.000000000000 2389 of 31883 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



5 inputs(s) for total of 258.430000000000 xmr

key image 00: 2257b22e0086c34a98c740b24d877fae5661303ac38044fe557773be24babbe1 amount: 0.030000000000
ring members blk
- 00: 227b04f3785076577423a66106b0d6092eb5501950f70ef1d7a769139ee014e8 00179168
key image 01: 62ddc063c4c6f4a805210b31f7eeab6d201cee40a143eb30d208c976f18d489f amount: 200.000000000000
ring members blk
- 00: 43fdfec263bcc377561338e66ebc19ec186733dab13032514919916c5a800a75 00179168
key image 02: 463f4541a7f10e84c456616a1c16a77a76cbee1673025121bc759636d796da25 amount: 50.000000000000
ring members blk
- 00: 85e1614d50539d9ed214110df9566533bf0b4f4111a5892cebf045c588a80243 00179168
key image 03: d0b8f0435103930ceb5fecbe27218a888c6bb017f379f55f4294279aa6ce06a2 amount: 0.400000000000
ring members blk
- 00: 5fda0f0876a39580e7870c3c24d9dbf59262b8c1b3169788a9183b18fd9780ce 00179168
key image 04: 40c9f720194c50a0d833f7efbb241c6463ba31d9b1894bb07e8dbd6650c9eb98 amount: 8.000000000000
ring members blk
- 00: 82ce837c171e2cda0c3ced90879e09b7aace60390d2978c32b71f4e047a59a16 00179168
More details
source code | moneroexplorer