Monero Transaction 690b54cddb3fa29146d1fa3c052ca923c79d79c5ce2907170addb2744ce8b84d

Autorefresh is OFF

Tx hash: 690b54cddb3fa29146d1fa3c052ca923c79d79c5ce2907170addb2744ce8b84d

Tx public key: 25e133805f184a7ff50755a84398e8944738804afda6aeb1189fff68ff294280
Payment id: 53304c4a63985796eb7d2d668c7d70d3216ad30914417fde029a4c0003ae9766

Transaction 690b54cddb3fa29146d1fa3c052ca923c79d79c5ce2907170addb2744ce8b84d was carried out on the Monero network on 2015-04-24 12:09:09. The transaction has 2834732 confirmations. Total output fee is 0.118769215517 XMR.

Timestamp: 1429877349 Timestamp [UTC]: 2015-04-24 12:09:09 Age [y:d:h:m:s]: 09:329:16:43:39
Block: 534758 Fee (per_kB): 0.118769215517 (0.291653900934) Tx size: 0.4072 kB
Tx version: 1 No of confirmations: 2834732 RingCT/type: no
Extra: 02210053304c4a63985796eb7d2d668c7d70d3216ad30914417fde029a4c0003ae97660125e133805f184a7ff50755a84398e8944738804afda6aeb1189fff68ff294280

6 output(s) for total of 19.881230784483 xmr

stealth address amount amount idx tag
00: b447492fba2fc3a37d2e7719834f595a09b7324724a8f0cbf7a5593ae5c6ff0b 0.081230784483 0 of 1 -
01: 3059097d2bb885e81c38f16ee345d1f6e55c13d123c742ae273833c08a954491 0.400000000000 398203 of 688584 -
02: 894b635e57bf43d47b067e42a68b26ca778f47e4fda06f0acba5ffa0de8d3354 0.400000000000 398204 of 688584 -
03: 69f5d042a8302f0122c5ce8c91b6dd2ffc35a0c7d3baf65f7cceca9fc45ea44f 4.000000000000 157839 of 237197 -
04: 1b064078c16f129933c2323ba8e9c5d1375f91c94c2cd04ec3d3ef4bb34d0d1e 5.000000000000 162429 of 255089 -
05: 94acd28a5ae007277eecb3c691a98a7bcb4375b9b9f0385c92f9f1ed9f743f4f 10.000000000000 612326 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



1 inputs(s) for total of 20.000000000000 xmr

key image 00: c0e3eaed945d2d4b93f8247c541e3e62df39d10a1a570f5e4cea2c5005f169b0 amount: 20.000000000000
ring members blk
- 00: abb3313a36aba8476eb4ee4b052d32227dca20a870a9a28a8acbacc62992f4da 00532043
More details
source code | moneroexplorer