Monero Transaction 131b87a3c6bc3ca3e39200ada6fb66806d083fcbb24b842073be105ad76784fb

Autorefresh is OFF

Tx hash: 131b87a3c6bc3ca3e39200ada6fb66806d083fcbb24b842073be105ad76784fb

Tx public key: 0e74d693a36ab4c572618e8c719a88c088596ed87740813ea596076dfd4e6f08

Transaction 131b87a3c6bc3ca3e39200ada6fb66806d083fcbb24b842073be105ad76784fb was carried out on the Monero network on 2014-06-13 09:32:07. The transaction has 3288457 confirmations. Total output fee is 0.005132508816 XMR.

Timestamp: 1402651927 Timestamp [UTC]: 2014-06-13 09:32:07 Age [y:d:h:m:s]: 10:282:20:54:17
Block: 83254 Fee (per_kB): 0.005132508816 (0.006118380707) Tx size: 0.8389 kB
Tx version: 1 No of confirmations: 3288457 RingCT/type: no
Extra: 010e74d693a36ab4c572618e8c719a88c088596ed87740813ea596076dfd4e6f08

16 output(s) for total of 2.995240000000 xmr

stealth address amount amount idx tag
00: 3be3707c8352b77d1392df7bd26ec0352813c31f4be541e78e9576ff60f55509 0.000350000000 1599 of 2205 -
01: fbf05fd19f8b718f7bf5c99f9679cf37bf599a05f57f6bc0f24b37bb348b537d 0.000370000000 1612 of 2194 -
02: 523770ff1c20bfea945088135d6c46af50ef9d990d18e34e643af19134747099 0.000430000000 1531 of 2079 -
03: 3e4af7a260b71a7e8c779e32869cb84b4961b019109616e48be465f5064b9e6b 0.000540000000 1595 of 2181 -
04: 4d2427b27e49ec261b6d7baaa746452171abebe850c550d68b46f2bb9c600dee 0.001090000000 330 of 446 -
05: 5512973e3bbba01f450311f564454161eeb4732533d4edc9d878aeddf8f624d9 0.001090000000 331 of 446 -
06: aea8ca3af1ae57db09bbf580521ce7460c72e5e7896f16c306ab37dc9403f377 0.001550000000 302 of 414 -
07: 3963182a7759faee85d2e02cf923883712434a3e6af3be51c1d81a659e5ba628 0.002040000000 292 of 400 -
08: 94d8bc2735d464e11a94fe0edd335794c72268fc8c355de05d5d6ad44265b221 0.002620000000 257 of 351 -
09: acff6cb77649194edefad5e210e32c4c878e9348f49f3d0c973505b94f81e3a6 0.004160000000 274 of 370 -
10: bc5f3f1fd815c56ef7b127b191434a2869c5ed44c9f631e5dd57f7f4c298ebd4 0.005000000000 108069 of 308586 -
11: 4d9c5b6017a6732da79edd67c2b27e56a67ab38ff68e0dc219e10cfffb89c6d1 0.006000000000 101504 of 256624 -
12: df507f38cbdffba9580816918c1d6ab4f65c5510b8561f342e96efa3eea9515d 0.010000000000 189848 of 502466 -
13: fa90e190f71511b4debf91f261e5d05bef50b5875cddb3d5a5c4b6bf29a41e94 0.060000000000 51405 of 264760 -
14: ac7adb52348a4d93a8bf935f652dd00b84142431e1043cfdb12ec518aac142da 0.900000000000 16601 of 454894 -
15: 4aeeed8601fbf5e074694ca2af6acd14608df2893467e97cc677399ab18458cb 2.000000000000 10748 of 434058 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 3.000372508816 xmr

key image 00: c0d0b015fbf36d13e4e01a8b60490fc14f4681fca7f269a8e3359f66dd723492 amount: 0.000372508816
ring members blk
- 00: a438d14b9db7bb46cb9f981106ec010929fb7d610c6fe66858a3b934d7bfc658 00083178
key image 01: cc6bed7a9347b55e61359ace457da8c6467968bf387578dd864cd12b02ba885c amount: 3.000000000000
ring members blk
- 00: 946f0c2ecb78a67b11257cfeaf148e5be0ea145fc1cb37cc0aa71d7c0a06380b 00083164
More details
source code | moneroexplorer