Monero Transaction 68f06d30337b647b676435204478759d3731ee3ee44e7fae08a311d9a7b5fe33

Autorefresh is OFF

Tx hash: 68f06d30337b647b676435204478759d3731ee3ee44e7fae08a311d9a7b5fe33

Tx public key: bc3598ab0d63a8837645755346e0188dd0b5fa9c0e3c6d7be9bfca0456e8a478
Payment id: 84d2679a326592949f10ac3dad9bb5c672da4dd65eec87dbf0df9fe6c5138929

Transaction 68f06d30337b647b676435204478759d3731ee3ee44e7fae08a311d9a7b5fe33 was carried out on the Monero network on 2016-12-04 08:51:54. The transaction has 2101380 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1480841514 Timestamp [UTC]: 2016-12-04 08:51:54 Age [y:d:h:m:s]: 08:001:15:27:46
Block: 1193878 Fee (per_kB): 0.010000000000 (0.009334548769) Tx size: 1.0713 kB
Tx version: 1 No of confirmations: 2101380 RingCT/type: no
Extra: 01bc3598ab0d63a8837645755346e0188dd0b5fa9c0e3c6d7be9bfca0456e8a47802210084d2679a326592949f10ac3dad9bb5c672da4dd65eec87dbf0df9fe6c5138929de2082f83de17122d7d6aea771311614aefc0c3258834d5839b26ebc8a122f4d161a

7 output(s) for total of 0.389000000000 xmr

stealth address amount amount idx tag
00: 4b970d17a9671e3ade8df633a6389130346ce99db13cca8299b9b10c75333194 0.000100000000 67087 of 79261 -
01: d7b0c823a62ea535ecaf4a2bad99b7c5eadaa4aa2c77e023f24c5a664769a243 0.000900000000 68768 of 81915 -
02: 35bba9687621cd50e3fff7fc06ce59b6cbfda3bbc03c8c1119b3853c33085d75 0.003000000000 73766 of 90176 -
03: f944527fc4efb91b573fc6fbb8a33a5f538eafca3ceaa4f6d6bcf2d652ac14c9 0.005000000000 292612 of 308585 -
04: bf8008f2b1a239c101749c7fb8d73a15934102c8929509a06745fe37d14a905d 0.090000000000 288387 of 317822 -
05: 76ade7134e3dc9373bcbe2e02ad9a0e482fd201d8e1e0c64ec86000f989605f1 0.090000000000 288388 of 317822 -
06: 740c56bbef8353426b858fbae1c3805905a972c7db6cf535b179347155dbd64c 0.200000000000 1222338 of 1272210 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



3 inputs(s) for total of 0.399000000000 xmr

key image 00: b636e4ee20d723abfd628da0ebd708313737dcb27bc02918ec1956ffb90264ee amount: 0.090000000000
ring members blk
- 00: 8417bf0d2ff22d6991fd4a9e468fcc501b701a38f180f233fe0bf488887e37ad 00084725
- 01: fd9e2a29b6dc1fb59e463b7bb89e29463048e3dccc35100e958b0eda3c7dfda8 00907096
- 02: d4a8a3cc334b3f0e780a1f908e68ea2946a80887ab75016c7fb7306e82d71ed2 01193700
key image 01: b6280b8259d6574576d38d0a0f82dd27606fb11870d85071e055e0331eb9569c amount: 0.009000000000
ring members blk
- 00: 49794b5722b91aae21ae33e95c4457fe5b0363d08d0ad56f4189094b6d19b99a 00071829
- 01: d049aaa01ba9effce0d52554f07db4bba71f7eb5aa62b391b0a13c85e79d0b93 00083988
- 02: 8a0048313ae78c2faac7b66362d3b6e68b31ed0ac840dcf0b5d098367311626d 01193466
key image 02: 7ee78cb20f6970fd77dcde37dc7ea7651af5b2e7e91160d1d35680e99bad672a amount: 0.300000000000
ring members blk
- 00: 6e79e53e87bc07bd176e8a71dc6478e93c048ecb4fd43c0fc1486dc424abbffb 00257848
- 01: 029aa606ccc03a37194ccd8950fcf26ba0ceb23fc621cdd4892076b80444b5d1 00910448
- 02: d736b4ab9f4ec9b1300600e39a7d0f394670f198cac6ab7166f66afc4fe4014e 01193651
More details
source code | moneroexplorer