Monero Transaction 12733886ded139a39cf96f558915979e626fb3cc57d5c155f4941c70b9e43c96

Autorefresh is OFF

Tx hash: 12733886ded139a39cf96f558915979e626fb3cc57d5c155f4941c70b9e43c96

Tx prefix hash: eedc54aa0ef597f7dc43caa090c3b823a03d60f26a4c02c197c4e53d547d9f26
Tx public key: 1a6338e7c9e6cd1f87d8e3408a5f5be42b0b73e76e39d02fbf7ea69bb444021d

Transaction 12733886ded139a39cf96f558915979e626fb3cc57d5c155f4941c70b9e43c96 was carried out on the Monero network on 2014-04-23 00:58:12. The transaction has 3271128 confirmations. Total output fee is 0.000001000000 XMR.

Timestamp: 1398214692 Timestamp [UTC]: 2014-04-23 00:58:12 Age [y:d:h:m:s]: 10:204:06:30:19
Block: 7048 Fee (per_kB): 0.000001000000 (0.000002868347) Tx size: 0.3486 kB
Tx version: 1 No of confirmations: 3271128 RingCT/type: no
Extra: 011a6338e7c9e6cd1f87d8e3408a5f5be42b0b73e76e39d02fbf7ea69bb444021d

4 output(s) for total of 0.000499000000 xmr

stealth address amount amount idx tag
00: e5a0163b2bb104860b3aadcc350d28e7e3385e1912ca22480ed849f35bffd356 0.000009000000 764 of 46395 -
01: ddbf3bb1e4cb3d131a72794141d26b385ad7d73d47eb17d457ba7a8fe30e86b8 0.000090000000 656 of 61123 -
02: b9d6a11c6e10264806e2b2ec7cce0cce774fd8e46dff74c3bec248f4ae2ae048 0.000100000000 730 of 79261 -
03: 3258fa408c68fbce73b5a51a90920d4669588238218299d6b8a8480912897f4a 0.000300000000 708 of 78258 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-04-19 05:15:44 till 2014-04-22 01:13:27; resolution: 0.02 days)

  • |___*___________________________________________________________________________________________________________________________________________________________________*__|

1 inputs(s) for total of 0.000500000000 xmr

key image 00: 96aecda463eff6aa9e8f83ef9fd320d75dd2f92c083ded0b3b4853d2240ae5f4 amount: 0.000500000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 15d66bf20c9a7744ec7b41b069bca59dbc9c8d5748cec8f83f61de3044894717 00001290 0 0/8 2014-04-19 06:15:44 10:208:01:12:47
- 01: c306b9fbe67c960c028df2a85bdd1193478f90a8ed673f6a78e0372054d0cec2 00005545 2 9/7 2014-04-22 00:13:27 10:205:07:15:04
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 500000000, "key_offsets": [ 127, 434 ], "k_image": "96aecda463eff6aa9e8f83ef9fd320d75dd2f92c083ded0b3b4853d2240ae5f4" } } ], "vout": [ { "amount": 9000000, "target": { "key": "e5a0163b2bb104860b3aadcc350d28e7e3385e1912ca22480ed849f35bffd356" } }, { "amount": 90000000, "target": { "key": "ddbf3bb1e4cb3d131a72794141d26b385ad7d73d47eb17d457ba7a8fe30e86b8" } }, { "amount": 100000000, "target": { "key": "b9d6a11c6e10264806e2b2ec7cce0cce774fd8e46dff74c3bec248f4ae2ae048" } }, { "amount": 300000000, "target": { "key": "3258fa408c68fbce73b5a51a90920d4669588238218299d6b8a8480912897f4a" } } ], "extra": [ 1, 26, 99, 56, 231, 201, 230, 205, 31, 135, 216, 227, 64, 138, 95, 91, 228, 43, 11, 115, 231, 110, 57, 208, 47, 191, 126, 166, 155, 180, 68, 2, 29 ], "signatures": [ "601e9b792524c71334e006ec10656914a382e6856590f64a1fb10a81ebe1f1088266735f66b9ee4821f1517d319a21b25641e99b3177b2fc3a737941e6f7f308460dd8dfcf08e34bde1e50b19dee7a53909e46bec324f6243001c1141c092004451d3cfb557a0bc4a399b347666460a5083f6abdccda83fab4b86012b1740d08"] }


Less details
source code | moneroexplorer