Monero Transaction ba68f1ec2f5b5b931e829a8fe0ed96e095ab448599777553e1aa3b96a322e7e9

Autorefresh is OFF

Tx hash: ba68f1ec2f5b5b931e829a8fe0ed96e095ab448599777553e1aa3b96a322e7e9

Tx public key: 632609b64a5442f64300a8362f8cf955ef2cf7bf0e6473852a6e712ee4fe8074
Payment id: 409ad81788bbda2ce3bc459745170f8e09d0906d1fd78663d129b74739d19ff5

Transaction ba68f1ec2f5b5b931e829a8fe0ed96e095ab448599777553e1aa3b96a322e7e9 was carried out on the Monero network on 2014-05-14 21:20:43. The transaction has 3238459 confirmations. Total output fee is 0.000001000000 XMR.

Timestamp: 1400102443 Timestamp [UTC]: 2014-05-14 21:20:43 Age [y:d:h:m:s]: 10:182:17:21:35
Block: 39935 Fee (per_kB): 0.000001000000 (0.000000865596) Tx size: 1.1553 kB
Tx version: 1 No of confirmations: 3238459 RingCT/type: no
Extra: 022100409ad81788bbda2ce3bc459745170f8e09d0906d1fd78663d129b74739d19ff501632609b64a5442f64300a8362f8cf955ef2cf7bf0e6473852a6e712ee4fe8074

7 output(s) for total of 16.988200963831 xmr

stealth address amount amount idx tag
00: 7d27d113871436bbd209addf59f8745d3cb4c2954e29c3ea2f3e1bffc608f793 0.000000963831 1 of 3 -
01: 9743f908ead81772176add267ad3d2b61b7878c29b39c1a1a784d4a04681c39e 0.000200000000 4184 of 78038 -
02: 2df68ce7f842d03942dd12524d33e4fe9dfee1bf6cddd72a77815ca2461afab6 0.008000000000 4132 of 245068 -
03: 372212092a13f0e66d5b773db1d0da339c9f6e4492ef0ba73c8e77a835fc0efb 0.080000000000 4494 of 269576 -
04: d9d7368e8231df1752d8cc4f1fce2f8f0ed6722891480ba6c723cac3e9e743cf 0.900000000000 4092 of 454894 -
05: 35635d971a99d9da2089bc5b3dc1b8c874f75610165be306a3aec799f2f53660 6.000000000000 4182 of 207703 -
06: 9e80d9ed84832c440361e0969a603df9208046fdb3e88509f2cdd7f6380255e6 10.000000000000 39767 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



8 inputs(s) for total of 16.988201963831 xmr

key image 00: ee63b7943bcf918199551c2f86c3fab1b33cb2ce7c7ca0f0fdf6f18f64545ea4 amount: 0.000001000000
ring members blk
- 00: bfec5196efeaff7cb3d3925da0231ad22a42942395d9471603771e7e8db70603 00036929
key image 01: 23b1e89c52e0026545cbd7c9e9f0ff12ceecd546546d000060f816b9098f812a amount: 10.000000000000
ring members blk
- 00: 8021844a97a0491c7feffa3ffc33b2c2ab20b9f16a2e25a5468c0e3e37f141a2 00036929
key image 02: 98ac7dbadedde04a0082581adb67a9c983707225ecf841b1ddf5c25745983927 amount: 0.900000000000
ring members blk
- 00: 7837fc7b972701a57bf7ba3518e5784ed5ac7eeca46746c6f24ecedc747a783b 00036929
key image 03: e640036ffaa5f6dd568f22abd352acc6e099f53b068b3f444c4d90c064f0cb22 amount: 6.000000000000
ring members blk
- 00: e91daf42ca8aa74102d675e413b588c34663fe9c48f1e2ed83d167c52eba2464 00036929
key image 04: bfb2a89b7c986997f7e3b245180c9333f86728bdb49a469ba1d3e864a8192954 amount: 0.000200000000
ring members blk
- 00: 21e526f9e121969b6b33efca9daa232f66156dce7de3ee9343c1b1856269962e 00036929
key image 05: 418c860375bfd5b3f81e8a6a93abc3ec7910be79977a7d6a137366bf39c54bb7 amount: 0.080000000000
ring members blk
- 00: a21ac8a0f07b6be5dab3820a538284d1dcecd55f7625372cd0f9171fe6e218e5 00036929
key image 06: bf5b4ada8163b9e4b59bad2e1b210dc189b481500dbcc118e95ff679b6913f00 amount: 0.008000000000
ring members blk
- 00: b004e080e01328dcec209a81ee872e717cfdb024c9fb2e8e9b9a742f547ebb2d 00036929
key image 07: d682e688734ef9f98510211b1d5b92fee8c21f1cc7fd792b02dd919e75b8c14e amount: 0.000000963831
ring members blk
- 00: c9698c9db11cf324338c7bdac9df7213e4fa76252da7f9255b9b18d570e6d8db 00036929
More details
source code | moneroexplorer