Monero Transaction 68239bcbfa10f707d9b1e955068918861ab6b1ccbd7d47540ad8265ab3383afe

Autorefresh is OFF

Tx hash: 68239bcbfa10f707d9b1e955068918861ab6b1ccbd7d47540ad8265ab3383afe

Tx public key: 0b616ca76821dccf8f3ae0a82e67f25c728dd5e9932c29972172980cbb5716cc

Transaction 68239bcbfa10f707d9b1e955068918861ab6b1ccbd7d47540ad8265ab3383afe was carried out on the Monero network on 2014-07-16 19:50:47. The transaction has 3146636 confirmations. Total output fee is 0.005279941707 XMR.

Timestamp: 1405540247 Timestamp [UTC]: 2014-07-16 19:50:47 Age [y:d:h:m:s]: 10:119:15:09:19
Block: 131648 Fee (per_kB): 0.005279941707 (0.003052885549) Tx size: 1.7295 kB
Tx version: 1 No of confirmations: 3146636 RingCT/type: no
Extra: 010b616ca76821dccf8f3ae0a82e67f25c728dd5e9932c29972172980cbb5716cc

28 output(s) for total of 18.159000000000 xmr

stealth address amount amount idx tag
00: de5033f8fd8475c324884b71f55ab176516ea6299a220dc5f51259c73018783e 0.009000000000 149594 of 233398 -
01: d753607f116084a2e56ae3608b80b5e92d041829755cb4855a52f2aa02cf22b5 0.050000000000 105445 of 284521 -
02: f85f8efd2648cf1df4840769fc6489b67c498acaf0c2b8548e64214c7613a841 0.100000000000 283491 of 982315 -
03: e09b2f311e16d0f3ea075d7f33a7885dcf26620eb501f2a3c9e265aa04504151 0.100000000000 283492 of 982315 -
04: 4607e3a7c63f45392975f03f6cfbde7b6fd45e5636fe385f0f61309c39e1db13 0.100000000000 283493 of 982315 -
05: d43b4e67fc54b259a6a974b17f00b4ffe6851df456c41ce70f6e552aa29ca3f0 0.100000000000 283494 of 982315 -
06: ed80a989304e1818d20a9a3c0b0fe06a666f1dd6d13a9bcd4d4fd61c33eb7e75 0.100000000000 283495 of 982315 -
07: 4e56234f26ca49dfd71442343ab7f274f22738deabe4b0db62a3e250d01b00c6 0.100000000000 283496 of 982315 -
08: 2046701ee57fb6c12c9f35386055500e55f6d059451daa453bc5d4bd9d1d664d 0.100000000000 283497 of 982315 -
09: 54220137e520a0ddd5ec53a072a56b2bdd1de372b5b0c0d9694ed11d13d555ff 0.100000000000 283498 of 982315 -
10: 5ad371d4071f4dbcbe3e20be3dc08779b32465c4972ced93422eedc5cf769ccd 0.100000000000 283499 of 982315 -
11: c8b8d083cf49e06caf414493598069fb77300ccb267c638e4407a022499fc4e0 0.100000000000 283500 of 982315 -
12: 800898ca9a751285897e0762c8712e4a1f1a2fbe62536bb405c59ed1ec7c6985 0.100000000000 283501 of 982315 -
13: bd1d5d0f88c696ac2f29da29c7a1b4172897c7d9d15cf8f5e2c2ce1f893e7efb 0.200000000000 207132 of 1272210 -
14: 55e7b944986ab890e818e1db490dd2b05bb5c9440122afd617bca898b0f6359d 0.200000000000 207133 of 1272210 -
15: 750dd99fa563bf6034259972ca4168aa898dbc88d7a09851f154079cb84665d5 0.200000000000 207134 of 1272210 -
16: cc23bc0497b00ea5d0686c35204131b6448ac55dd2558c1d3e2b74f041fbc54f 0.200000000000 207135 of 1272210 -
17: aec93b9ea12c11af8cf2701830b00f2afca75f75b1f0b1e23fc1c6f9cc942689 0.200000000000 207136 of 1272210 -
18: 6b3e35938cbbfae8f490be94920704151812d80be2c19215adaa82c9358af3ef 0.200000000000 207137 of 1272210 -
19: 3711b510c812b431b1dd8c7a97f197a1368779c278a73d2860526d762cac8e2f 0.300000000000 103150 of 976536 -
20: 40228b5b29025d57a52c4dfc20cc044033e1bffe1676b864e57ef99aa7ede5a9 0.400000000000 89149 of 688584 -
21: 754f7d358f113d0d3223dcc9baa9dd34570acdec345587d5b63258b33caf1f42 0.400000000000 89150 of 688584 -
22: f3345766b9cefa070a629ee5336eeb81cebd87c5bd2cb3c535c91e37f124df7a 0.400000000000 89151 of 688584 -
23: 8c9917edeb18384a25989fc2b4379f1af1ceeb967cf23e9512557c01b3f61738 0.600000000000 89464 of 650760 -
24: 2ccc2908b5f0cc343789897d49416597869d08153c993fe76e0e165ca1ca5520 0.700000000000 68684 of 514466 -
25: 5763d7935ae0589f648f74a4b45fb73c66b5f475e798a3c6d6d79b093c676716 3.000000000000 28665 of 300495 -
26: 4a6ffdd9ccff4f8ce688ecbf9b53489709ab9108b22e459f068a3fda177388cf 3.000000000000 28666 of 300495 -
27: e75ed038e019bfb5d484591c3208e15b2ebad77afdcfca30c649235a2bb6dc4d 7.000000000000 44911 of 285521 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



6 inputs(s) for total of 18.164279941707 xmr

key image 00: 8afcc850335bc04c752acac4deb6c5e9a6baf43185f145656508ee7abef49bc9 amount: 0.004279941707
ring members blk
- 00: ee9e4f1bb88da1cbb8d5584f3d3c12ef29e83c4d021748730a046be52587f508 00112889
key image 01: d8739acd35f821986b32407559a1533b4430fcb4a7bfc88d6e800f26558a5f89 amount: 3.000000000000
ring members blk
- 00: 20b526b59e9a45cc361fcd2bb2fa87590c9d6a3b27f67a61f4e13e01b00a1a93 00131635
key image 02: b31ba26522bb9676d31da1a4f5f99f0b28d5aea3b8d18f15c3afdbc1b6baabc5 amount: 0.100000000000
ring members blk
- 00: ab7835c79080d1a5433467d91f15a4b7a6471624ba55680d45982da33a9d7cb5 00131635
key image 03: aea8e3c0e6a68adcbfeb4cc729944b4a6d46764da36ffcb818d9f93d529f4fe0 amount: 10.000000000000
ring members blk
- 00: e063a0cd8abc65179b9a06b9011d7f853a165f351a559bc4b79616eeabddd549 00131578
key image 04: 310d9a782248479c93ee03150053c42a2a9ed858087be753340c2eeb5437ff3a amount: 0.060000000000
ring members blk
- 00: ebde11af6b1e20cddef1ff4b3f62488f7f9a5f951792b36fce32fc971478188e 00131566
key image 05: c5b3fab24f006c930723bd211d49ea1b52fa9091ff41ea38982c0157de6f8ca5 amount: 5.000000000000
ring members blk
- 00: 807d46b3ad2a3245a3defbf84d7657b5d4088ff6c238828209fe31547c4d606a 00131578
More details
source code | moneroexplorer