Monero Transaction 68da374d75427af37b04ac3c817b310183c68d6a7fa7fe8e493f912a80d9ef98

Autorefresh is OFF

Tx hash: 68da374d75427af37b04ac3c817b310183c68d6a7fa7fe8e493f912a80d9ef98

Tx prefix hash: a4611c1e8d7c144893f2744c4e4e4add95df5fb69a74b77536f98138009016f0
Tx public key: 10c034fccc402bc0ce307e9a865b62e2e16438975a58ccead5dfad6099828aa7
Payment id: 7f375c3993d6bc60393b99a700a162509a5035b27075d1093b90e96b20bf4f23

Transaction 68da374d75427af37b04ac3c817b310183c68d6a7fa7fe8e493f912a80d9ef98 was carried out on the Monero network on 2014-06-19 16:36:43. The transaction has 3187822 confirmations. Total output fee is 0.005150000000 XMR.

Timestamp: 1403195803 Timestamp [UTC]: 2014-06-19 16:36:43 Age [y:d:h:m:s]: 10:149:14:24:44
Block: 92456 Fee (per_kB): 0.005150000000 (0.012040182648) Tx size: 0.4277 kB
Tx version: 1 No of confirmations: 3187822 RingCT/type: no
Extra: 0221007f375c3993d6bc60393b99a700a162509a5035b27075d1093b90e96b20bf4f230110c034fccc402bc0ce307e9a865b62e2e16438975a58ccead5dfad6099828aa7

4 output(s) for total of 3.995000000000 xmr

stealth address amount amount idx tag
00: 404faf848c7096b10d39441f9bae2e269c0f956014d4144c638ad7f8305fb2cc 0.005000000000 158580 of 308585 -
01: 6bfeb0dbca131bf4e02d6dd92ad036ce3b788b77efe5089561ac215ee06784d3 0.090000000000 58333 of 317822 -
02: 0c07652c610dd0319c188fe58d5f005848211f3eab5c25868469876c802f3c6a 0.900000000000 22579 of 454894 -
03: 7c19bfed6b13637aeec06bcf6a119e341a941d07437b86b9e35ce5fb4339ea5f 3.000000000000 12413 of 300495 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-17 04:10:40 till 2014-06-19 16:48:10; resolution: 0.01 days)

  • |___*______________________________________________________________________________________________________________________________________________________________________|
  • |_______________________________________________________________________________________________________________________________________________________________________*__|

2 inputs(s) for total of 4.000150000000 xmr

key image 00: 202b70bd056ac6ac7b352389e33617f1d7a1864d9b375b4bc89ee20a638f6b3f amount: 0.000150000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7ada89096b2e9ece3af2530df19fddbd7d4bbf6329b5c2d9bf96930f58ea528b 00088882 1 7/31 2014-06-17 05:10:40 10:152:01:50:47
key image 01: a1d7d757454b515f54e0269bc510d1050b470dc2557344c8307e068f8721a20e amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 643345c4207641fa4ec218210e764975376daa6c9247a8c6ce04a36fe0f4f21d 00092396 1 4/4 2014-06-19 15:48:10 10:149:15:13:17
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 150000000, "key_offsets": [ 1889 ], "k_image": "202b70bd056ac6ac7b352389e33617f1d7a1864d9b375b4bc89ee20a638f6b3f" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 11311 ], "k_image": "a1d7d757454b515f54e0269bc510d1050b470dc2557344c8307e068f8721a20e" } } ], "vout": [ { "amount": 5000000000, "target": { "key": "404faf848c7096b10d39441f9bae2e269c0f956014d4144c638ad7f8305fb2cc" } }, { "amount": 90000000000, "target": { "key": "6bfeb0dbca131bf4e02d6dd92ad036ce3b788b77efe5089561ac215ee06784d3" } }, { "amount": 900000000000, "target": { "key": "0c07652c610dd0319c188fe58d5f005848211f3eab5c25868469876c802f3c6a" } }, { "amount": 3000000000000, "target": { "key": "7c19bfed6b13637aeec06bcf6a119e341a941d07437b86b9e35ce5fb4339ea5f" } } ], "extra": [ 2, 33, 0, 127, 55, 92, 57, 147, 214, 188, 96, 57, 59, 153, 167, 0, 161, 98, 80, 154, 80, 53, 178, 112, 117, 209, 9, 59, 144, 233, 107, 32, 191, 79, 35, 1, 16, 192, 52, 252, 204, 64, 43, 192, 206, 48, 126, 154, 134, 91, 98, 226, 225, 100, 56, 151, 90, 88, 204, 234, 213, 223, 173, 96, 153, 130, 138, 167 ], "signatures": [ "49336b5d82dc08b240ee6bcbaf6394daf8bd37365a29a6bfe98253072ed57e0dd2eaf41d20875245aeb7150a1127962320ad5db4fe3904fc3c1717cb18c0b50a", "defb099b49bc2dc09ed66c2b4511d4105e8d7b997c605f28efe5274c385a0e059599ef984fc88e0342afa4dcb6f60cbbbad5e57bf750f869101b0819cae7d808"] }


Less details
source code | moneroexplorer