Monero Transaction 68afa4e7887506fd0236a259b7c1b67bb3472b37e807c62e98dc508d782d6951

Autorefresh is ON (10 s)

Tx hash: 68afa4e7887506fd0236a259b7c1b67bb3472b37e807c62e98dc508d782d6951

Tx public key: 108aa09c12b1df8a6aac95ac84c3e99ad87a68703a00bc495ab83cd0bc18ab5c
Payment id (encrypted): ead7addc807ca5ad

Transaction 68afa4e7887506fd0236a259b7c1b67bb3472b37e807c62e98dc508d782d6951 was carried out on the Monero network on 2020-04-14 16:04:33. The transaction has 1235290 confirmations. Total output fee is 0.000030600000 XMR.

Timestamp: 1586880273 Timestamp [UTC]: 2020-04-14 16:04:33 Age [y:d:h:m:s]: 04:257:14:32:58
Block: 2076653 Fee (per_kB): 0.000030600000 (0.000012033180) Tx size: 2.5430 kB
Tx version: 2 No of confirmations: 1235290 RingCT/type: yes/4
Extra: 01108aa09c12b1df8a6aac95ac84c3e99ad87a68703a00bc495ab83cd0bc18ab5c020901ead7addc807ca5ad

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: 69f15aee035db08516b2dbaba4a55e4f602e37bd76426732fbe04e496060aa96 ? 16324570 of 122370092 -
01: 677cad89ff88fb9bbdcd6bf8ced13cb7aeb7044e1c45d6854b84100845406f7c ? 16324571 of 122370092 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 input(s) for total of ? xmr

key image 00: f62bced17efee8d09ea2624d0be82c34a5e21934468fa832ea1c1657986e4d53 amount: ?
ring members blk
- 00: 0a728e90c2d72246a82eb5fca27eaffaae4ae5011f1ac8d550732f2bb4478994 01964075
- 01: 0a4c77114ea71ceeed72b6503245c15b2dbd77d7ea3db4a60ca73590e8319a8e 02068653
- 02: 70efbea134974fee06a9a8a01dfc7bcaca2e17eff424ee0e666b9eba22cd29b0 02071959
- 03: 249d9724fa5e225cc9d9b91566904dd35df1b307d1b214061e9a36a572fca287 02072151
- 04: 1d0fdb84f6e9ef882baac69adee105dcd39701340eeec1fa291e5136674d3e5c 02074532
- 05: 7d7bb0bd1e5c7b472dfa38475aeb55909b77835f371103fc11f2f5dc74e6b22a 02075722
- 06: 23c924282b0b3da1268b6e8f4057ac1be785b2aefe972f9fc4d6deb717ae7dd2 02076307
- 07: a53e3181af756ad48f91051fd188e231a44afdecf7f2d05e87831411586a6017 02076344
- 08: 812c4114bc7d5ba54f6725fdfe124ac8d5886394a2c8876e9aca082fcc3bdf72 02076539
- 09: acfaf8a14a74600d3e6efa0388c6d2a2fc0a4c20d3df3d1a275190886b87333d 02076555
- 10: 371f03fe6410471d10f4f8d54b73404dc171cbeee7c024e5122bd0f3911b14d2 02076642
key image 01: c597146ab6c9c91ddbfabc94adac716fe702108a12c260c2c62059655cfc2ab1 amount: ?
ring members blk
- 00: b495f0217522a6b7d2b39a9642c259a94b09abcd8ea85df207496c6722f679f7 02047275
- 01: 872508076af61a21a4dfc7a905aca126b2d8de3781d1ec79bac376245b754cfa 02070761
- 02: 04f9c27aa7e19990c8776efa2fcee0079fb89b9c8fc4a37e83599d6aadd3764c 02075143
- 03: 669aae32334b620d731df4d76c084252da377d9b238db18f668da0f6c774ac57 02075867
- 04: 968317482780d1b7e9bee133402368abd45b273eff9cdcc51b4c6453b2e0562e 02076011
- 05: ca94442b68ac89cab679afe18b563e33b1fc900d70dffe93965ac659127be149 02076061
- 06: 94ae207f955576308fc2f8159b438ddef1483b070899f9c713b48acdcde8e8b0 02076281
- 07: 4f9c5bdc9faf66e689316ba849d758acf9bb9af029b395a79bbefa1f6d8f11f7 02076286
- 08: 42b54f571c7fd82f9d0598a1b94aa90212ca94bc39305ad6a5a557bf0b7f60e0 02076352
- 09: ac23d8a2c3db6f17425369f9d82f6a26ec2cc7c29540de73cf6236f78d7ab8c8 02076533
- 10: 31215bb716729cfd3fb3ae4abcb33793622660760dcd24c2dd0a20e3f58a918c 02076620
More details
source code | moneroexplorer