Monero Transaction 68078b468c03c8412fbc2ddeb1279d2d5aba70cf58fd407e7aae29d268e6cd28

Autorefresh is OFF

Tx hash: 68078b468c03c8412fbc2ddeb1279d2d5aba70cf58fd407e7aae29d268e6cd28

Tx prefix hash: 89023317b43defade9d6251d332a11f0eeb0138d0e4c139f596bf2b8b97f2845
Tx public key: f34d0006663071c138133013c43cf54c4c4151858bee17e72044e1e5b71f8238

Transaction 68078b468c03c8412fbc2ddeb1279d2d5aba70cf58fd407e7aae29d268e6cd28 was carried out on the Monero network on 2014-11-07 22:47:43. The transaction has 3008991 confirmations. Total output fee is 0.176316260000 XMR.

Timestamp: 1415400463 Timestamp [UTC]: 2014-11-07 22:47:43 Age [y:d:h:m:s]: 10:041:16:56:01
Block: 295301 Fee (per_kB): 0.176316260000 (0.550450762927) Tx size: 0.3203 kB
Tx version: 1 No of confirmations: 3008991 RingCT/type: no
Extra: 01f34d0006663071c138133013c43cf54c4c4151858bee17e72044e1e5b71f8238

2 output(s) for total of 0.500000000000 xmr

stealth address amount amount idx tag
00: 6135fd5019c6362fd61232645e8561c89f35eb09eb6836230428d7d97594c3a1 0.100000000000 622087 of 982315 -
01: 4a975aaeb09b0b0a25cd5d465d08dd6490fb67ebec3176bc706a81092293967f 0.400000000000 268584 of 688584 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-11-04 23:35:50 till 2014-11-05 01:35:50; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|

2 inputs(s) for total of 0.676316260000 xmr

key image 00: 9e81c39cccb8251a0e19e538b721e1cad76e23e8db0746eb48425dcf30e7fbd7 amount: 0.076316260000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7f147741a2552b64899b536cb58c6422ee34fda6a463fcc217efe5596f5fd114 00291015 1 4/100 2014-11-05 00:35:50 10:044:15:07:54
key image 01: ddbbe17497f075d1988d0c9c1ef049b3c3fe7555b30df5136a0d4a5ea2c3561d amount: 0.600000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 260716ccbee7295cb376647ff42cc2e1e868d3ecbfe283d05a4340f5d5911b5a 00291015 1 4/100 2014-11-05 00:35:50 10:044:15:07:54
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 76316260000, "key_offsets": [ 0 ], "k_image": "9e81c39cccb8251a0e19e538b721e1cad76e23e8db0746eb48425dcf30e7fbd7" } }, { "key": { "amount": 600000000000, "key_offsets": [ 265449 ], "k_image": "ddbbe17497f075d1988d0c9c1ef049b3c3fe7555b30df5136a0d4a5ea2c3561d" } } ], "vout": [ { "amount": 100000000000, "target": { "key": "6135fd5019c6362fd61232645e8561c89f35eb09eb6836230428d7d97594c3a1" } }, { "amount": 400000000000, "target": { "key": "4a975aaeb09b0b0a25cd5d465d08dd6490fb67ebec3176bc706a81092293967f" } } ], "extra": [ 1, 243, 77, 0, 6, 102, 48, 113, 193, 56, 19, 48, 19, 196, 60, 245, 76, 76, 65, 81, 133, 139, 238, 23, 231, 32, 68, 225, 229, 183, 31, 130, 56 ], "signatures": [ "3f948f08f35b360a378ce1dddbb786267338fc24d855ee70d9af95b697645803cd9222e5810410d8ee973453924cee2b6e200d2e0de9538f719e60cd200fa800", "3939ef354b9eefa45369ce84303fec3f709e6cc32ed3b8b14f51040a2ce66706446d8e4dd86be1a5c2a443c2262bc9778fa7d5f69304ffff009309d3b506730e"] }


Less details
source code | moneroexplorer