Monero Transaction 68ae6c9bd0f1aed2d00d9f3d4382e7cce4efc0d2d86ea96b5b6bd251d9d0492c

Autorefresh is OFF

Tx hash: 68ae6c9bd0f1aed2d00d9f3d4382e7cce4efc0d2d86ea96b5b6bd251d9d0492c

Tx prefix hash: f06c187db3c1ea988ed9ba02c5cabbdb754e85d72ab65c4f9b520ad4995eaecb
Tx public key: c543d9f6d94c558ebd4aef1cb7a48b2756f687aca7851c32e638c0633247c9cf

Transaction 68ae6c9bd0f1aed2d00d9f3d4382e7cce4efc0d2d86ea96b5b6bd251d9d0492c was carried out on the Monero network on 2014-07-24 03:38:54. The transaction has 3167095 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1406173134 Timestamp [UTC]: 2014-07-24 03:38:54 Age [y:d:h:m:s]: 10:155:12:17:19
Block: 142264 Fee (per_kB): 0.010000000000 (0.024265402844) Tx size: 0.4121 kB
Tx version: 1 No of confirmations: 3167095 RingCT/type: no
Extra: 01c543d9f6d94c558ebd4aef1cb7a48b2756f687aca7851c32e638c0633247c9cf

2 output(s) for total of 0.390000000000 xmr

stealth address amount amount idx tag
00: f70b71ae77241d6374ec41d73867e4cab0e06986bee0347aa11412376585e1f8 0.090000000000 87923 of 317822 -
01: f4dcc26021e0736a5848b79252db21d9abfb5eb1fe7932722dbbf58f8404db5a 0.300000000000 116226 of 976536 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-25 15:11:26 till 2014-07-23 19:25:13; resolution: 0.35 days)

  • |_*____________________________*____________________________________________________________________________________*_____________________________________________________*|

1 inputs(s) for total of 0.400000000000 xmr

key image 00: e6a9838ecc3710021dd9f189df8521149947c4ea917dec02236daee51e1c15e7 amount: 0.400000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: addd3eeb4167777a975fb3935c238e06609665c4d9ee106b362e5c675ca18156 00056097 21 21/5 2014-05-25 16:11:26 10:214:23:44:47
- 01: 728100607aca1aefc8419d9ddc6202f9e651713efe1a39df285efa4cc0329d19 00071146 0 0/5 2014-06-04 23:21:53 10:204:16:34:20
- 02: 311214e78040bc759eed54db5f058d434e62cd694fba84d9cabf943fc8e25f0b 00113996 1 29/78 2014-07-04 13:16:35 10:175:02:39:38
- 03: a570f92ca60f848671f8bc32aafb848627be16badf0c9bad1b039ea0fac5795b 00141728 4 2/5 2014-07-23 18:25:13 10:155:21:31:00
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 400000000000, "key_offsets": [ 7872, 7823, 48755, 44545 ], "k_image": "e6a9838ecc3710021dd9f189df8521149947c4ea917dec02236daee51e1c15e7" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "f70b71ae77241d6374ec41d73867e4cab0e06986bee0347aa11412376585e1f8" } }, { "amount": 300000000000, "target": { "key": "f4dcc26021e0736a5848b79252db21d9abfb5eb1fe7932722dbbf58f8404db5a" } } ], "extra": [ 1, 197, 67, 217, 246, 217, 76, 85, 142, 189, 74, 239, 28, 183, 164, 139, 39, 86, 246, 135, 172, 167, 133, 28, 50, 230, 56, 192, 99, 50, 71, 201, 207 ], "signatures": [ "a7bfcffb546a64710aec95a055ee81ad6477691397b7909207713c08f763340d39fde95991e8e9488cc326c50b9b7dbc37531ed2e8790bd7cde53881aee8f807664989dc765cc299c8d34ae3820640b5f045783b2d251db6d33f32dcafee5e08422739382ecaa4407326b48f321150c578c6780461c7df9318b9e4544a04e1061cebc0a111e53ca132915e2011260ea2dc35d4a456c581a700d731f5d1bfea0d37fa3381dcf0e6045fa825374952c33bc8c8664e18e9ddfca14879a75d34ba0c503f1b5f4f9ff6d203e85c653f0cd63e4364785a9cc63ad3296ac942d2a8e10e4e8541d420b662416493e97505d7433359a8b72d235a0f7704f715e2628c4006"] }


Less details
source code | moneroexplorer