Monero Transaction 68c44a2c936ec50958927feddd8c45299008767567aadbbff18c2fb55d6917a8

Autorefresh is OFF

Tx hash: 68c44a2c936ec50958927feddd8c45299008767567aadbbff18c2fb55d6917a8

Tx public key: 04956de9063e9537dc2349e623ef5316ca450f4d930f372a5d5f809168ca0579
Payment id: 17114b9d0f8a42ada28ef4a324f46c4930bd148dc1ee47b1b2f8d4e02c2a219b

Transaction 68c44a2c936ec50958927feddd8c45299008767567aadbbff18c2fb55d6917a8 was carried out on the Monero network on 2014-09-19 05:39:21. The transaction has 3071005 confirmations. Total output fee is 0.162546073074 XMR.

Timestamp: 1411105161 Timestamp [UTC]: 2014-09-19 05:39:21 Age [y:d:h:m:s]: 10:078:16:52:54
Block: 224199 Fee (per_kB): 0.162546073074 (0.157769837751) Tx size: 1.0303 kB
Tx version: 1 No of confirmations: 3071005 RingCT/type: no
Extra: 02210017114b9d0f8a42ada28ef4a324f46c4930bd148dc1ee47b1b2f8d4e02c2a219b0104956de9063e9537dc2349e623ef5316ca450f4d930f372a5d5f809168ca0579

6 output(s) for total of 14.646497970000 xmr

stealth address amount amount idx tag
00: fc739e8708b22cb9147ab90f74c5f7af5bcf48a229d71b70317b9e347e9ecb03 0.046497970000 0 of 1 -
01: 1feae8c8ba2d40656e0bc1e576e0ab06f8f1bddda071e5cdf685bfa8e7fd8000 0.800000000000 159168 of 489955 -
02: ba7aaad9a2b303f8641883944f65cfc19d4d7d6a234a2b9223a5fd915e6bf012 0.800000000000 159169 of 489955 -
03: 0796e7b4fd61a58c559afc99fbc63ec17b3b70d6c606dd71e53e241cd29eb04a 1.000000000000 267856 of 874629 -
04: a934a37738fa2774b82e078a83c204648f780bbefa177812777d5c0568398922 2.000000000000 102714 of 434057 -
05: d2ca07724481ee0ca17c26d2c3984aebba5dbd9f78183eef48afe59eeadea14c 10.000000000000 260581 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



7 inputs(s) for total of 14.809044043074 xmr

key image 00: 986ee6253a1b5804daf1021fe24e6373a18793e2f48e00064c4151fd023c03f2 amount: 0.009044043074
ring members blk
- 00: 447fc766662997a240b33677581a93bd5ffdc1fb6d611ea9b48146945f84bbc7 00197283
key image 01: 97241acd0591c5fd5f2828b2750f9fa17c4fdcb34833d9569b551cec9ebadc73 amount: 10.000000000000
ring members blk
- 00: dc318c5aef64d902ae07ce88728e28679aa1c79dbc9944ec264a869aad9acb24 00223358
key image 02: 440f8edf68fad0b513e0a0f53884c5061fc809e4c1b58628d961b6d00e38b27a amount: 0.200000000000
ring members blk
- 00: 10912c2527def96b9d044a5794f6fba91c0b5c770cb0765f4fd4826af4ce91c8 00223692
key image 03: b7d6c72dea9f705c880720f8d0da02ea0e71a699ab78eae873098b799fad1dec amount: 1.000000000000
ring members blk
- 00: 7ff326e950d3c3769060542fa3473d9d7b54bc8dfeb968a5ba89a575cf2a3a94 00223906
key image 04: a74ed6cbfa12264cda881df72617b71b5e810af7c8ba63d712c5fe1adf807080 amount: 0.400000000000
ring members blk
- 00: d67f2309dbff038ceb3f61d6d262255e396eaab0039598b9cbb0976299a1f151 00223611
key image 05: 7c4e1ae3f31f440e8f87c6c4aaae1b97431d79effb48d6d90c1237ac7f13c994 amount: 0.200000000000
ring members blk
- 00: e205261929eca5cd1f458887122bfaf276615eb9b19faa62bb21401cb4863fc7 00223826
key image 06: 74048ab45790dc350f216057d9697d618894f45103eb2a1a1d15685dd2d5ca88 amount: 3.000000000000
ring members blk
- 00: 940f65cd76db19fb94d27ab184b1707c238298ea5a0b5d5f9dc59e5b8aeea56a 00224037
More details
source code | moneroexplorer