Monero Transaction 68c1f98e5026b710aeac3968b8920d5770ed6bcbdc274ca9a976e3d464410cd2

Autorefresh is OFF

Tx hash: 68c1f98e5026b710aeac3968b8920d5770ed6bcbdc274ca9a976e3d464410cd2

Tx prefix hash: 74bf3819b3eab0ee50b5030ca8ad0fe852c2093cc664aec5a7d02f984a61e2a4
Tx public key: 715a57ff5afd37ad6fbe19d4fd9cf824051d12132e893becd5bf001031f28989
Payment id: 33aed4dd136fa5d3cc796d0a53130d0f01a6efad0fd777123bc08d64e1bc50d4

Transaction 68c1f98e5026b710aeac3968b8920d5770ed6bcbdc274ca9a976e3d464410cd2 was carried out on the Monero network on 2016-11-06 08:01:33. The transaction has 2130926 confirmations. Total output fee is 0.004000000000 XMR.

Timestamp: 1478419293 Timestamp [UTC]: 2016-11-06 08:01:33 Age [y:d:h:m:s]: 08:042:13:01:33
Block: 1173554 Fee (per_kB): 0.004000000000 (0.003683453237) Tx size: 1.0859 kB
Tx version: 1 No of confirmations: 2130926 RingCT/type: no
Extra: 02210033aed4dd136fa5d3cc796d0a53130d0f01a6efad0fd777123bc08d64e1bc50d401715a57ff5afd37ad6fbe19d4fd9cf824051d12132e893becd5bf001031f28989

7 output(s) for total of 29.996000000000 xmr

stealth address amount amount idx tag
00: 569bb76b926d379bc516035da000b6877d71549a5a096dcd8663b8aea65e0682 0.002000000000 71000 of 95916 -
01: db866216676e90173d2c428d2c72ae61f90bd91da8e4d8ce1f74df5f52292440 0.004000000000 64107 of 89181 -
02: 9ed8fdcf0352697216fe79b9ada5b261706a2f0a20ce2b61c1a19193734b9284 0.090000000000 275944 of 317822 -
03: 30dc7470a7c1fa5960ed839f79f994573c3f2e183f3f40a7b0ca470345fb6338 0.900000000000 420527 of 454894 -
04: d40ddebc7133e0ff9b5e7a3d226440346c4f2f5cb121215316d544eb664e87e7 4.000000000000 221662 of 237197 -
05: 589bf5c826f76a700e84fc9477f2bdd4c3d7a508d552049f170121cde7cac006 5.000000000000 237158 of 255089 -
06: f0bc872259462ba368d94ed302d07d18177e5eabedfbb2bf78711790414429ef 20.000000000000 71068 of 78991 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-23 08:01:48 till 2016-11-05 06:08:56; resolution: 5.09 days)

  • |_*______________*_*____________*__________________*____________________________________*____________________*_________*_______*__________________________________________*|

1 inputs(s) for total of 30.000000000000 xmr

key image 00: 11b3cd244380d0d3f1681a178df7307de0e011a64771368c49d30ca046401c38 amount: 30.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 30dc4a34f9099ee77936d547cc3f8cd49e54aa9df8601bf598c7bc2d751117a0 00097875 1 36/69 2014-06-23 09:01:48 10:179:12:01:18
- 01: 130dc6c99b735cbe309eadca48aa71cd4c91aab55646c4b9439ae9508ad3d59b 00213207 1 7/4 2014-09-11 12:27:58 10:099:08:35:08
- 02: f7a2b5ce15daab157dece98cd9a447a024411756532eb33f207fbd2d727b037b 00224912 1 44/1 2014-09-19 16:55:15 10:091:04:07:51
- 03: fd465c4f6ec4d5d355578248da6f3f1dade5d14a742c538a9c463d59e20d8831 00323470 1 13/8 2014-11-27 17:04:29 10:022:03:58:37
- 04: 3544254b410ced09a1a0bac54bd67ae84b141c70b3bad59b827e3283f934c3b7 00457311 1 4/8 2015-03-01 11:13:32 09:293:09:49:34
- 05: e46ab5680abd86ff51954e3d96fb15bbd9a51a137206bcbf33e9dc0311769917 00732583 1 17/6 2015-09-10 00:53:40 09:100:20:09:26
- 06: 087a7a79f179b1b2124d80564b154f5b0abf536eb6c65f6c62a0d98af29753c9 00883151 11 10/3 2015-12-25 03:42:43 08:359:17:20:23
- 07: bd0ef9201bec549833da49609fc105cad5a1a6056f6f679d320bdf65c55a244c 00954024 6 14/3 2016-02-13 06:43:21 08:309:14:19:45
- 08: e70bde4d4a52dc1d060d23eac34a88a20cfe5f27f15d06d7c63427401581f6a9 01011339 4 36/6 2016-03-25 16:49:59 08:268:04:13:07
- 09: 8fdc312ad5d5b2cc8ca4579fca31c212a3e62c672e6bdf2613dd18038da38d85 01011633 3 68/8 2016-03-26 02:28:12 08:267:18:34:54
- 10: a5cc83d5f84988efe71a00e06dda89da677f38cdfc42978140fc1f35f5640aae 01172780 11 4/5 2016-11-05 05:08:56 08:043:15:54:10
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 30000000000000, "key_offsets": [ 1627, 5622, 415, 3810, 4061, 8075, 3484, 1621, 1899, 13, 12852 ], "k_image": "11b3cd244380d0d3f1681a178df7307de0e011a64771368c49d30ca046401c38" } } ], "vout": [ { "amount": 2000000000, "target": { "key": "569bb76b926d379bc516035da000b6877d71549a5a096dcd8663b8aea65e0682" } }, { "amount": 4000000000, "target": { "key": "db866216676e90173d2c428d2c72ae61f90bd91da8e4d8ce1f74df5f52292440" } }, { "amount": 90000000000, "target": { "key": "9ed8fdcf0352697216fe79b9ada5b261706a2f0a20ce2b61c1a19193734b9284" } }, { "amount": 900000000000, "target": { "key": "30dc7470a7c1fa5960ed839f79f994573c3f2e183f3f40a7b0ca470345fb6338" } }, { "amount": 4000000000000, "target": { "key": "d40ddebc7133e0ff9b5e7a3d226440346c4f2f5cb121215316d544eb664e87e7" } }, { "amount": 5000000000000, "target": { "key": "589bf5c826f76a700e84fc9477f2bdd4c3d7a508d552049f170121cde7cac006" } }, { "amount": 20000000000000, "target": { "key": "f0bc872259462ba368d94ed302d07d18177e5eabedfbb2bf78711790414429ef" } } ], "extra": [ 2, 33, 0, 51, 174, 212, 221, 19, 111, 165, 211, 204, 121, 109, 10, 83, 19, 13, 15, 1, 166, 239, 173, 15, 215, 119, 18, 59, 192, 141, 100, 225, 188, 80, 212, 1, 113, 90, 87, 255, 90, 253, 55, 173, 111, 190, 25, 212, 253, 156, 248, 36, 5, 29, 18, 19, 46, 137, 59, 236, 213, 191, 0, 16, 49, 242, 137, 137 ], "signatures": [ "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"] }


Less details
source code | moneroexplorer