Monero Transaction a68af72b25628239fab1954acf39367f0c39cb1ea3ead17c8aa54ffae6280f27

Autorefresh is ON (10 s)

Tx hash: a68af72b25628239fab1954acf39367f0c39cb1ea3ead17c8aa54ffae6280f27

Tx public key: eb4d153896ae40c6b3d8120053e3793a269b7902eb2cea7e5671eacfa80dca04

Transaction a68af72b25628239fab1954acf39367f0c39cb1ea3ead17c8aa54ffae6280f27 was carried out on the Monero network on 2014-07-26 09:31:30. The transaction has 3132720 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1406367090 Timestamp [UTC]: 2014-07-26 09:31:30 Age [y:d:h:m:s]: 10:109:23:39:13
Block: 145506 Fee (per_kB): 0.005000000000 (0.006928281461) Tx size: 0.7217 kB
Tx version: 1 No of confirmations: 3132720 RingCT/type: no
Extra: 01eb4d153896ae40c6b3d8120053e3793a269b7902eb2cea7e5671eacfa80dca04

7 output(s) for total of 5.340000000000 xmr

stealth address amount amount idx tag
00: e45f70961af571d69563400bc0404389abeb0d29b760c477c763f29809ee5f49 0.040000000000 124727 of 294095 -
01: d3f8ed97564ab8c8f91e79efecf973a7812c0e9883b3861535bf219643f9ea15 0.200000000000 261373 of 1272210 -
02: c0f22ad9bafef2fc71f7bd205c997e3f555e8497a74ff440edca70b30cb6f049 0.200000000000 261374 of 1272210 -
03: ac53285fcb3d81d512c47e56f93ad9c9433849f95c51d6b090e9845025b35662 0.900000000000 66001 of 454894 -
04: 689b6b5cce022ec486020760b12e3ef5776a5f798a8bf63bc6b8cd43bf895c92 1.000000000000 136407 of 874629 -
05: 034a62cc3cdd24379b9fbc1fed1e121689063161a3051e37331078180217b42f 1.000000000000 136408 of 874629 -
06: 468f989e7109f056ec67739680e8327e87f6526e9106ede1ad0c9df32f23b972 2.000000000000 54345 of 434057 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



4 inputs(s) for total of 5.345000000000 xmr

key image 00: 54c7a42d9ea1280f974b18cb437a967a3bd12515dba5e267bfc66483b5d6704e amount: 0.005000000000
ring members blk
- 00: e259b315ea22dd19090b9817200cd854fced832a9022a185359f1524380a5325 00145173
key image 01: c0abf6591125eba444b37f6d36ec141f2b14cc5895a4aded37b4e888c0731a38 amount: 0.040000000000
ring members blk
- 00: c75236c099abc9321de4f0dbd268203190f3f436d22e57e5f231b629d69a29bd 00145404
key image 02: 1c7daf6bce03e8e8d29be002a321720893fb1d936cc002ce710cb576c4319b24 amount: 0.300000000000
ring members blk
- 00: 4d1c66742f1525eff99d456a8b759d062ceae059d82f30c5d07070cbf18e7423 00145444
key image 03: 01b275996671066b5f16f3ec21043007dca7439627be6892653ffc357edf5fd8 amount: 5.000000000000
ring members blk
- 00: 49d68599aeca37c923d177185299f663b717537c78500c7a2bea4d0127a8c94c 00145442
More details
source code | moneroexplorer