Monero Transaction e68129976b5363f6bb991701b2f7b5e6031b06963d1034733b83f077bf73da60

Autorefresh is OFF

Tx hash: e68129976b5363f6bb991701b2f7b5e6031b06963d1034733b83f077bf73da60

Tx public key: ad01c3d76d489a4a6c0905e19f04c9923fafacadcb592d105cc60efe4e41ebce

Transaction e68129976b5363f6bb991701b2f7b5e6031b06963d1034733b83f077bf73da60 was carried out on the Monero network on 2014-06-14 09:44:02. The transaction has 3205395 confirmations. Total output fee is 0.007979048891 XMR.

Timestamp: 1402739042 Timestamp [UTC]: 2014-06-14 09:44:02 Age [y:d:h:m:s]: 10:168:14:03:05
Block: 84752 Fee (per_kB): 0.007979048891 (0.006546911911) Tx size: 1.2188 kB
Tx version: 1 No of confirmations: 3205395 RingCT/type: no
Extra: 01ad01c3d76d489a4a6c0905e19f04c9923fafacadcb592d105cc60efe4e41ebce

29 output(s) for total of 0.192020951109 xmr

stealth address amount amount idx tag
00: 3afc00d21256f0ff79258cd20d9bea195dc7780798c681298bf9980eac62fd34 0.000358178309 0 of 1 -
01: 0d1f4b20c6ba1d94d6626cb696c8ac54a4188bc091d58535ee55a91db8e0ca2d 0.000673433555 2 of 3 -
02: db5ca89e7174e99fecaf6004b1fb5e16cb9cf02bd0f8326432902ba3ffbf122c 0.000727667818 1 of 2 -
03: 7d1df1155eac3c86d5df36f0e46ca51c93aa74d2b406f27c83fbfabe7a9db915 0.001035744915 0 of 1 -
04: a9390ce25442e69055b754ea76f951b5a717e22c87dc1943609c60f68f374945 0.001141241257 5 of 28 -
05: cb0a7fb5ca99af4289cd004ab464e937241ba81582e975b41eb4fed03312328a 0.001141241257 6 of 28 -
06: 82b0cad0fbb12d6b67a5a3654c8ae691f60ec6ca7821b781b4cdc024b636b10d 0.001141241257 7 of 28 -
07: 0f2896322ded54230cea381c267415efb552910d4e8244da666afc913eb87a33 0.001141241257 8 of 28 -
08: 7f922d4c3bb26fb10679558fc68b6a88376708ee0323857e313b3a73e99b3c7b 0.001141241257 9 of 28 -
09: 77a7dc952aa56a79646e8e46fe77f8b1c0c126be76b545f0a6bc2749b5219ca9 0.001141241257 10 of 28 -
10: d5ac4f0621987ee4602a6235614d3975d44f09ec76b83cfba617a48df754c719 0.001141241257 11 of 28 -
11: 8be5fa21ff31ea881fe91c893324a9d9f0ca59a9c0d573abd3f52eaa869a86c4 0.001141241257 12 of 28 -
12: 7b42302c4dbb3d47eaf7e02e1bc17b25cda9d7b34504ac9a831ce0e895f6bb63 0.001141241257 13 of 28 -
13: 486139c34c575f36d6a861035146de8e413e795cd3b52096aacef35164b8ac19 0.001141241257 14 of 28 -
14: ca1a20afd51b18d02d2312d3511f30ec30ff9c536c7d56806167ec9443ddbf33 0.001141241257 15 of 28 -
15: 2d99a56d4fac9aff9548afa78fbeaadf3eb3e554685de29b5de1e31ab65e3b6d 0.001141241257 16 of 28 -
16: 13b482e2e829221cda6247119498fc786552ab7cc476b6cae7c3fa66dc992f23 0.001141241257 17 of 28 -
17: d0af02629610d54223ce94b9cc431a660969d4e8d915698efe98be057cc9a081 0.002282482514 6 of 11 -
18: ef50b2a000eea543551db5891d8cb4cedf08a3ab7852b343dd6bc0bb97a1884d 0.002282482514 7 of 11 -
19: 4feb4bec31ae7347047398a57cb8107ce4fee1bf715f095317390a5cc20c3546 0.002282482514 8 of 11 -
20: 3d5a126401825b2b8164f004ec5a15c608d35c9d01562f390ed41fcef0c2141b 0.003195475520 2 of 4 -
21: ebab3dffabfdcb063131bcc3b4827167516ed02b61fe661378b81836bf410894 0.003423723771 3 of 6 -
22: 9aa4351ec984b222c133fb5449a6f226c596db6530fe0f80cf0217f4afb50ee2 0.003923143338 0 of 1 -
23: 88a62d04ec8b4e0248d988ffccbebac3af9e2ab2612ae3aa9a22d3012d1db49d 0.008000000000 101996 of 245068 -
24: 44afa8faa7a2fd20f0690ed701c7ca852ca4a08ed4d3a6489300fa87a3972453 0.009000000000 98102 of 233398 -
25: c6c179748e9307d949e9141cdb55c658638747cf2085c2ccaf17dfe6c4970218 0.010000000000 211798 of 502466 -
26: 8e68481cae694321de8245955c5e90aebca585910b5101871cea2b1a79444ab2 0.010000000000 211799 of 502466 -
27: 0576127e325f2206bb8e2c3f9c97c5920153b0619c3d5e8aa060230d2f527b5d 0.020000000000 131128 of 381492 -
28: b15798a840e9c0844d9da6d872071e2ecbab8b6011ab8ed0a190bc427e610ae4 0.100000000000 90753 of 982315 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



1 inputs(s) for total of 0.200000000000 xmr

key image 00: 0d39e24aed166c1fb1daf25b5050a6f2c10be136d21076dadbe2cc5759e6c117 amount: 0.200000000000
ring members blk
- 00: 8a714a4f70211abbba67b6f7663591f5d455897666416ce9d7f42765f16a1556 00084711
More details
source code | moneroexplorer