Monero Transaction 0d13b2778ece8bdf2b6554f5d8a53b7077b8d321d392c0be725cc7f5224f928b

Autorefresh is ON (10 s)

Tx hash: 0d13b2778ece8bdf2b6554f5d8a53b7077b8d321d392c0be725cc7f5224f928b

Tx public key: 146ea4fa9dcba5c17d96e9fcf0c03565adae8e96b2ee44aa175eb55ac8a6f6d8
Payment id (encrypted): 05b4b43341b02742

Transaction 0d13b2778ece8bdf2b6554f5d8a53b7077b8d321d392c0be725cc7f5224f928b was carried out on the Monero network on 2020-02-25 17:06:35. The transaction has 1247823 confirmations. Total output fee is 0.000032710000 XMR.

Timestamp: 1582650395 Timestamp [UTC]: 2020-02-25 17:06:35 Age [y:d:h:m:s]: 04:275:00:27:47
Block: 2041438 Fee (per_kB): 0.000032710000 (0.000012867860) Tx size: 2.5420 kB
Tx version: 2 No of confirmations: 1247823 RingCT/type: yes/4
Extra: 01146ea4fa9dcba5c17d96e9fcf0c03565adae8e96b2ee44aa175eb55ac8a6f6d802090105b4b43341b02742

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: 19cd4ceda039d321e248d7501fe6c08aa29d2f2f90a358c2e4111c90cb522eaf ? 15124799 of 120178009 -
01: d84ed33fafc8953d9e5257a7a5a7eb8d8e7ed5bf80da2227627e64454185d078 ? 15124800 of 120178009 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 input(s) for total of ? xmr

key image 00: 973781f5901967e664fe2cce2dbbbe395ef44bcb962c736224e59ae506bb8a38 amount: ?
ring members blk
- 00: c2527695540db1bf5983aa056f63b58c63cabb6431ca2bd329622b7274738299 01988744
- 01: fb12239ae34f930ced27e59b275b2aa42a0569ed9003f026e50a9ceb3dadd378 02029866
- 02: 20e175473ecf67c53000a0d76818f6a87a06aa7d9ffca8cdf648165ddbcdccd0 02036805
- 03: 9bee5bfd6c40d676b9eaa0851fc7cf04d625014a059dadd13a2a705464c4b6e5 02036873
- 04: 10503f7d4b4d2b8fdfa2904f5201d0d084e55c4eb1c4db444f38b53525c7f37b 02036983
- 05: 60965ccb28605dc74fcff780a607da0cc9ed266bb9b2054202ba81ef5b9a5e3f 02039883
- 06: f797e538b3b6562d63413c541ed21e069db5eae88cebaef392e5cf2c1e9e6dde 02041084
- 07: 6e40f2898267e2cc57f5304b6c9e6adab1f52f1126c415a731bf04311fe1f361 02041209
- 08: e47267ccf89924e05a73cec7932bd335b5e2b5bbafbdda08aa4cd821016b9afb 02041323
- 09: a62589ade3e312935424da740d2a2600f2fa94fe3a131b94e53d7e65c320c042 02041336
- 10: 2a9aa76b402768a06774302432928105d152bb19c7dc391d7a3c4bf489f5e401 02041381
key image 01: 163435d97fc2c7f01e4104b12fc9398b877d9b91b25e9a3d135a3536d4f7c53a amount: ?
ring members blk
- 00: 9a19a27fa8088e9b7e0d819c34c48d24c39e83c82c732d9cc558b60c261755f2 02016630
- 01: a9e7085ee2d3aeb2d7a100beb2fd20b8c435cab7d74e7e09e352c294a4c28c22 02034862
- 02: 05a9fa391f8352c1a50c9880ec7f6d6563683174909ba4e6cdc3335e83b0953c 02036959
- 03: ef76a89ddfbe06417d0070121a4cd5dd873600a121fb888b770a1fb13f3d21ee 02038575
- 04: 3a0823f5464e29516f6f954d7ef7e42b17793ddc101988778ee531991edb73da 02039501
- 05: 0827ac01adc00dc66c0a4b3498a20bf1669e639ab14acab6a555b0d5f8b6fe43 02040733
- 06: 87eb633f21fa85e8cf46e04b337aa875b142ef362712200c02a5af1964ae68fd 02041224
- 07: 7f7401b2fa09952da60b8a4cc7a07ff8f428fdff7823eb06bf056632adc28415 02041224
- 08: 65f9c568b777c233a173365977ea9c8d5c8a529c9d71e9ea290f61ce9b52a18e 02041283
- 09: 803fc17c747381e4607b6395fc8d89e6fafe83484d51c8472e8d97a88fdcfc9e 02041368
- 10: 8fa2bb5ccbdae304b1506cf661fd2a72017b51538fba5cd37e19c5b02dd5bfbd 02041370
More details
source code | moneroexplorer