Monero Transaction e68dd172f77ee7321c08f802aee49c73a109a0c31866db73476cd8a3d0fe2e54

Autorefresh is OFF

Tx hash: e68dd172f77ee7321c08f802aee49c73a109a0c31866db73476cd8a3d0fe2e54

Tx prefix hash: 9056af96e1ccaa5438568d3deeea1a9d90c9aca286e2c2407a1ddd2cf61b43fa
Tx public key: d537270d8817854a8e8958b49fc38e95574b7857289bda50107401d2801e995f

Transaction e68dd172f77ee7321c08f802aee49c73a109a0c31866db73476cd8a3d0fe2e54 was carried out on the Monero network on 2014-06-13 18:19:38. The transaction has 3194464 confirmations. Total output fee is 0.000001860110 XMR.

Timestamp: 1402683578 Timestamp [UTC]: 2014-06-13 18:19:38 Age [y:d:h:m:s]: 10:152:16:18:29
Block: 83804 Fee (per_kB): 0.000001860110 (0.000001863750) Tx size: 0.9980 kB
Tx version: 1 No of confirmations: 3194464 RingCT/type: no
Extra: 01d537270d8817854a8e8958b49fc38e95574b7857289bda50107401d2801e995f

12 output(s) for total of 4.278998467608 xmr

stealth address amount amount idx tag
00: d26993603880b303d4369c56e85238128eedf6866e7d3748672591b1d8cefa55 0.000000467608 0 of 1 -
01: cf090fba06717182bf86b2bbe951611bd92e0eae05e43dc648ae68b73990edee 0.000008000000 18720 of 42741 -
02: 69fa301cb455c2eccbebc5726b101db9d306493a5b61c037cfb843a1a12809ef 0.000020000000 34638 of 59482 -
03: ed51b3ca4efd531ed0576d69ccd95c18e3f8fc1cb9447625e805f706ab410d49 0.000070000000 34365 of 59071 -
04: f8d034a60189cf9f81325d9edabdb0da453dbdab2235e02554fd20e163794b17 0.000900000000 34725 of 81915 -
05: 02333467c9c9f079b1b5daa3f329461ebd011607d2bfecb1fd5a7c6b01ed85f3 0.001000000000 42888 of 100400 -
06: e5716fb457b326e7e41a806fc09d3f4f284156125738e79352b7e4be2e8c999b 0.007000000000 100183 of 247340 -
07: edbfe4c035f756309b65de6cab07ef124707af366faca9a98f549b8c0070ff5d 0.080000000000 44430 of 269576 -
08: 69273dff0f509a628d5bcc8848578374672c11dd224f1567790108cdc8256d9d 0.090000000000 41296 of 317822 -
09: 353a9700433a7a876cb7da36bef7b022fed45f8b3094c008348fdc9f9335589b 0.200000000000 44095 of 1272210 -
10: cfdadc30287f5596b48cb5ce7a2272d7b7d71a7d1798b5f49bf3754294d4f9e0 0.900000000000 16948 of 454894 -
11: 007dec0f88533a72a0496103c263e6584471539150571b789cb2e5294f8583ca 3.000000000000 8553 of 300495 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-07 09:04:47 till 2014-06-13 12:20:26; resolution: 0.04 days)

  • |________________________________________________________________________________________________________________________________________________________________________*_|
  • |__________________________________________________________________________________________________________________________________________*_______________________________|
  • |_______________________________________________________________________________________________________________________________________________*__________________________|
  • |______________________________________________________________*___________________________________________________________________________________________________________|
  • |__*_______________________________________________________________________________________________________________________________________________________________________|

5 inputs(s) for total of 4.279000327718 xmr

key image 00: d6be8b2c707dd354c0a25c24ada88a5b5d788ff4f92b7c998f8f8ff907f1063d amount: 0.000000327718
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 442c6128f6fb3a994b8f56f3d0cfaf50049e45368a5ffa8a66cd48ca512f79d4 00083380 0 0/7 2014-06-13 11:20:26 10:152:23:17:41
key image 01: 2abf94b8399dcfa9a940be7360b06a0872995a9e00813d9457f9a5b13672ee01 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 95bea0c4a5514360a585e51136e7523af313af5c17509f7cfd4043f29ea6205d 00081735 1 19/6 2014-06-12 08:34:58 10:154:02:03:09
key image 02: 9e403495a09be7e06577e68e8d4d096d478e22743a403879af89a323288e17fe amount: 0.070000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4f7ab7003479a9e485494074de25ad199b5cc641f5731c32dd8008d967a81112 00082042 1 10/15 2014-06-12 13:20:46 10:153:21:17:21
key image 03: f110120f4811bfc77e0fbf62cce6d53f1a58e8f975c7ac6cb050a159e5679974 amount: 0.009000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 33e2142b52aff329c5005b4c720399e48a3a6c94a37c84249057ed9aba7be857 00077721 1 1/8 2014-06-09 14:47:31 10:156:19:50:36
key image 04: d31f3019db5f0e76d7d2ac6401dc7d36fc1c046777fbc735f517b1bd2ab9b02f amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e70cc6c5d3c8bbab7b1a9ca7b23a4d8a98b6eeb4af5a2df45c9c2df7f56ef6ee 00074540 0 0/8 2014-06-07 10:04:47 10:159:00:33:20
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 327718, "key_offsets": [ 0 ], "k_image": "d6be8b2c707dd354c0a25c24ada88a5b5d788ff4f92b7c998f8f8ff907f1063d" } }, { "key": { "amount": 200000000000, "key_offsets": [ 37789 ], "k_image": "2abf94b8399dcfa9a940be7360b06a0872995a9e00813d9457f9a5b13672ee01" } }, { "key": { "amount": 70000000000, "key_offsets": [ 42195 ], "k_image": "9e403495a09be7e06577e68e8d4d096d478e22743a403879af89a323288e17fe" } }, { "key": { "amount": 9000000000, "key_offsets": [ 63630 ], "k_image": "f110120f4811bfc77e0fbf62cce6d53f1a58e8f975c7ac6cb050a159e5679974" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 4914 ], "k_image": "d31f3019db5f0e76d7d2ac6401dc7d36fc1c046777fbc735f517b1bd2ab9b02f" } } ], "vout": [ { "amount": 467608, "target": { "key": "d26993603880b303d4369c56e85238128eedf6866e7d3748672591b1d8cefa55" } }, { "amount": 8000000, "target": { "key": "cf090fba06717182bf86b2bbe951611bd92e0eae05e43dc648ae68b73990edee" } }, { "amount": 20000000, "target": { "key": "69fa301cb455c2eccbebc5726b101db9d306493a5b61c037cfb843a1a12809ef" } }, { "amount": 70000000, "target": { "key": "ed51b3ca4efd531ed0576d69ccd95c18e3f8fc1cb9447625e805f706ab410d49" } }, { "amount": 900000000, "target": { "key": "f8d034a60189cf9f81325d9edabdb0da453dbdab2235e02554fd20e163794b17" } }, { "amount": 1000000000, "target": { "key": "02333467c9c9f079b1b5daa3f329461ebd011607d2bfecb1fd5a7c6b01ed85f3" } }, { "amount": 7000000000, "target": { "key": "e5716fb457b326e7e41a806fc09d3f4f284156125738e79352b7e4be2e8c999b" } }, { "amount": 80000000000, "target": { "key": "edbfe4c035f756309b65de6cab07ef124707af366faca9a98f549b8c0070ff5d" } }, { "amount": 90000000000, "target": { "key": "69273dff0f509a628d5bcc8848578374672c11dd224f1567790108cdc8256d9d" } }, { "amount": 200000000000, "target": { "key": "353a9700433a7a876cb7da36bef7b022fed45f8b3094c008348fdc9f9335589b" } }, { "amount": 900000000000, "target": { "key": "cfdadc30287f5596b48cb5ce7a2272d7b7d71a7d1798b5f49bf3754294d4f9e0" } }, { "amount": 3000000000000, "target": { "key": "007dec0f88533a72a0496103c263e6584471539150571b789cb2e5294f8583ca" } } ], "extra": [ 1, 213, 55, 39, 13, 136, 23, 133, 74, 142, 137, 88, 180, 159, 195, 142, 149, 87, 75, 120, 87, 40, 155, 218, 80, 16, 116, 1, 210, 128, 30, 153, 95 ], "signatures": [ "1696a9bcb67bf0aaef034a2ad32a0a31215626788ab08219d1e6deb68f435908d0c426fbc57e75cd5c622424518e4a8fa6efb9c79529d1900e120265e7170102", "311914cea84551ec23a16815e37d1346b67aacde3f5474d464904c899eaeac05b8b665f19ac2fb24ec582a02b9778c03c429634d805e9f5fdcb76709182b540b", "684fb5b88e46589cc63b98d5b2040a46fc16257a03cc3dcf34643ded04ef0f070b13ed51282628fff8db767cfe67c35cd87cc26f3cc15c75ed8067617effea07", "dbbae03c156d4a8724f90c97cdfb9b21cbe453152ee0bbe8517eba87310acd06116337d11b4aad63064539a1206a174a61988110b06fb512afc9871e0c3c9308", "a58c47da18030a6d1ad5c56c537037d0f3d31ced6257ae10822f1769f379b3021ed4974579920f23d08ebcf60c336bca3d554a070796ca15a42123f9926b0d0d"] }


Less details
source code | moneroexplorer