Monero Transaction 668ac7dc3f8108952f141480a68fe54cb3899f0b45f1d1f73f32691303f80aa2

Autorefresh is OFF

Tx hash: 668ac7dc3f8108952f141480a68fe54cb3899f0b45f1d1f73f32691303f80aa2

Tx public key: 5101be05667d4a981d9f9dde775120c682dd8250a11ef981eeeb5bcb93f410c4
Payment id: dfc406d7e09a8e44eab4e0a180104d955627522bd6413298723b63a3b16c45ec

Transaction 668ac7dc3f8108952f141480a68fe54cb3899f0b45f1d1f73f32691303f80aa2 was carried out on the Monero network on 2014-07-23 03:43:16. The transaction has 3148647 confirmations. Total output fee is 0.005629510000 XMR.

Timestamp: 1406086996 Timestamp [UTC]: 2014-07-23 03:43:16 Age [y:d:h:m:s]: 10:128:20:22:36
Block: 140795 Fee (per_kB): 0.005629510000 (0.004600653025) Tx size: 1.2236 kB
Tx version: 1 No of confirmations: 3148647 RingCT/type: no
Extra: 022100dfc406d7e09a8e44eab4e0a180104d955627522bd6413298723b63a3b16c45ec015101be05667d4a981d9f9dde775120c682dd8250a11ef981eeeb5bcb93f410c4

8 output(s) for total of 6.024370490000 xmr

stealth address amount amount idx tag
00: a69d91ed716fb744f2b1af721db0d213dfb0c4acd35ce3ae3d74a160c5c8c254 0.000370490000 1 of 2 -
01: 1d20e3ff17988d9ce4890302e5f102eca68c79949fc46d5646c58e61e60a0a45 0.005000000000 193233 of 308585 -
02: 984b3115965417f77a99d2f9cc3d8d7ac337e079c5411df13e16de89523b998b 0.009000000000 151626 of 233398 -
03: 6bfb2a2a8a3854a0d38874782a6049739bd977d36777a7ef6666a0ccb39ad404 0.040000000000 123521 of 294095 -
04: e4e5589a1417f8547b54cc2f1af19e6024794e5a37bc90803bc1f1f2909d4ab8 0.070000000000 85972 of 263947 -
05: 88399a279bac9da72c9171f99122e3df0b37bd75fdcc7a54ea335123d8452f33 0.900000000000 62741 of 454894 -
06: 2b984ca836de2ef1a5f22ddc644121d32a28aed852ffe53f2ab29e8fb79bab07 1.000000000000 126513 of 874629 -
07: ed40406ccdf8cbaa4aa9852be63a62fa2d6fa9c5de8f53f57f18f516fc6f20cd 4.000000000000 26508 of 237197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



5 inputs(s) for total of 6.030000000000 xmr

key image 00: fea80024f4437cd7d95df35e64bb0b6a06c3af6a5303ea2b7187c8a44c9a25b3 amount: 0.800000000000
ring members blk
- 00: ec6e7071444506f60f48c8777eaccb9cf8991595052df664359d9820d8cddefe 00115117
- 01: 32d2dba0170d0f457b593487977fd05d5e611b3bf9f432b44c3aff818d7d71fc 00140784
key image 01: b425eb8ebd39a18286be9d50080c169285a6af2a47486265547acb40c0ad5c2f amount: 0.100000000000
ring members blk
- 00: d45f5a594e3081507d50973aa9fbf1e51923042ac232b84179c2dba5e20fdf43 00093971
- 01: a0e4434e9ef8c2354a50b446f102d92713e7c6829814b8b005f142455b26fd6a 00140770
key image 02: d8ef5e171fefb654086a705168bd2ca6bbc5451dcc9dbce6a38c5a4d761c0b0f amount: 0.090000000000
ring members blk
- 00: b9979399dde46b5f4db19e2d41ba4761f44492b61d9d07c8f60d8bbbffc1d634 00087842
- 01: a6497b652f8ad759f002417d21eb3159ce07b7b778351d784634de568c5c8d64 00140777
key image 03: fa47f23f750c6b62d0ea60153f9599eaa460a54522fe1701818f02668242cd40 amount: 0.040000000000
ring members blk
- 00: af67229660edbef7bb9837adf2c1d6102a339f80d723a2504a268303a9c1ff32 00071923
- 01: 5dc2cf324b0ddb794dddda43a43e48f25a6a62679c1cd6696f543aea515ecf39 00140718
key image 04: 5118eabd29d6582fe37b8d686c5b281da07a9ccfe5a104c5510dc5a0f7b1219f amount: 5.000000000000
ring members blk
- 00: 89382a9237ae1672a7263261f9c15d19410a974c882c30ca623b320f9a2eeff0 00103675
- 01: d5409c99c513eaf463d9e83f8d3eaf0c5abc150631d8c2a1b396271c46d27005 00140715
More details
source code | moneroexplorer