Monero Transaction 8068b9e4ae5a84b5e3655b646de73fa39dc2ddcb751efaf9353edca2ff408f55

Autorefresh is OFF

Tx hash: 8068b9e4ae5a84b5e3655b646de73fa39dc2ddcb751efaf9353edca2ff408f55

Tx public key: 16df7f44c73ddce232120c8323729ac468f1788648098cf3d6698df827c978fe
Payment id: 6ec963f1cba9f9f255c0e22f3a6b376782dfda6049ca24a185f44c3a4090f033

Transaction 8068b9e4ae5a84b5e3655b646de73fa39dc2ddcb751efaf9353edca2ff408f55 was carried out on the Monero network on 2014-09-17 19:19:43. The transaction has 3080041 confirmations. Total output fee is 0.130904770000 XMR.

Timestamp: 1410981583 Timestamp [UTC]: 2014-09-17 19:19:43 Age [y:d:h:m:s]: 10:090:00:25:10
Block: 222204 Fee (per_kB): 0.130904770000 (0.181389018241) Tx size: 0.7217 kB
Tx version: 1 No of confirmations: 3080041 RingCT/type: no
Extra: 0221006ec963f1cba9f9f255c0e22f3a6b376782dfda6049ca24a185f44c3a4090f0330116df7f44c73ddce232120c8323729ac468f1788648098cf3d6698df827c978fe

6 output(s) for total of 20.169095230000 xmr

stealth address amount amount idx tag
00: 8d088930d73c8250a0b43568758890692b1a338c41d017089fe2d42c95e1dabb 0.069095230000 0 of 1 -
01: 68d04093ce8f5cff8f5584fc711336798f9049d2233902397dc77c99105ca8b1 0.500000000000 322197 of 1118624 -
02: 2816adf88a3d1e0499cef6543a9a34b7b36b4bcd72291541776bcc9f8c85c630 0.600000000000 207413 of 650760 -
03: 7fc6bd9600159630c89ab1f43b1d42cd233274dd02b351f57950c0880789bee1 4.000000000000 97103 of 237197 -
04: bf993bf0a6d52d1693ed1162b4cbc03728b4434e0ba7c7dae7760caca5a748fc 5.000000000000 113811 of 255089 -
05: 4e4f5afbfcd05b8ea0fd6f35088750f4fec9627d867e0c5197b479bd97e70b85 10.000000000000 258085 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



4 inputs(s) for total of 20.300000000000 xmr

key image 00: db7226924a1ab2c378d42c396b52d9770ddc3d47764a8fd2c260aaa1e6bca91e amount: 0.100000000000
ring members blk
- 00: 66d0633c44278827794f1fc803ff45ccfeada8ea18249073f1ef9cb43fecc423 00197461
key image 01: 500b6272e2abaedc60f17a14391b73547ecec196e3e35675d111af53f05f7190 amount: 0.200000000000
ring members blk
- 00: 91e4db0d4227c98a34c636fdcac9ab63cfb4ac3795c4aaadde209fdc4cfc546c 00222087
key image 02: 0441163aee4ae376bc20e6a8a3814e6c99db5a3695b03fc44cd3d7a177b94cb2 amount: 10.000000000000
ring members blk
- 00: 98135b9f2402d0a32667a49aedd237b2bded834b6fb570d5b150437a5d3c5c75 00221993
key image 03: 29e199f99307290a8ff35cc84aa21374a0396025507bd4d013118543ee9de5ae amount: 10.000000000000
ring members blk
- 00: df1f2cab90389e58b60f5cdab076562e86c5d1c1b6ece952d77e56bf610aa9ba 00222101
More details
source code | moneroexplorer