Monero Transaction 131e94f536df74b9e4d482fad50e57f01f03f45fcb570f4ac08a29d1b0c2182e

Autorefresh is OFF

Tx hash: 131e94f536df74b9e4d482fad50e57f01f03f45fcb570f4ac08a29d1b0c2182e

Tx public key: 22fc53d8c1c5a168bfccb056f803220837c72ee302a8f3e6f31bfa429a3778bf
Payment id: b2bf92b44ce2cbec9aa7dc133862ecb94404c201406625c1c88cdc0feb0c8c9f

Transaction 131e94f536df74b9e4d482fad50e57f01f03f45fcb570f4ac08a29d1b0c2182e was carried out on the Monero network on 2016-12-31 23:24:55. The transaction has 2073114 confirmations. Total output fee is 0.007455160000 XMR.

Timestamp: 1483226695 Timestamp [UTC]: 2016-12-31 23:24:55 Age [y:d:h:m:s]: 07:327:14:02:41
Block: 1213845 Fee (per_kB): 0.007455160000 (0.007010177998) Tx size: 1.0635 kB
Tx version: 1 No of confirmations: 2073114 RingCT/type: no
Extra: 022100b2bf92b44ce2cbec9aa7dc133862ecb94404c201406625c1c88cdc0feb0c8c9f0122fc53d8c1c5a168bfccb056f803220837c72ee302a8f3e6f31bfa429a3778bf

14 output(s) for total of 109.992544840000 xmr

stealth address amount amount idx tag
00: 04ea3b5e56e51f374f0c830cdfc35a1bcea71aa82908095fff43fc22a56b10b5 0.000000040000 17795 of 22714 -
01: 2b9773faef0cd24a38d80e5c42372f111b463addd5c859571e88caab9b09bcc9 0.000000800000 17825 of 22876 -
02: 0343135d84f635f768f7cb4809e355f30136b98a2257728fd851819091b1c421 0.000004000000 36562 of 41587 -
03: e4197243103f4fde0f30b8b7f76d8868cc9e1ef288973e3b33a788d7b0a20fe0 0.000040000000 53680 of 58748 -
04: f589738024e79d1022880e55d54fd80e2a4df9a38686b8562875a1bde9d7e2ac 0.000500000000 71813 of 77939 -
05: 60577bad912ce8856bc58575dd599402f5bdd6c4be4d9eb602a606c5d604f2fa 0.002000000000 87203 of 95915 -
06: 4e4ed5d0ba395df6cb1ecc30366a807c8576f974f1dde2a5a9b3d469152cba18 0.020000000000 371752 of 381492 -
07: e7d610c7bccab5eebe7eb73cc6b73bd33b89b704b3385c244913f310c7098245 0.070000000000 254864 of 263947 -
08: 04da18eb5aabb994c621d26a1c1852d25ad09e8f8232f139883209d46b6496ec 0.200000000000 1254149 of 1272210 -
09: 3f911184082e3bb7b2cf889f15ea7fe2de73db5a82a0e455e279df931c4b4f80 0.700000000000 507127 of 514467 -
10: 653cfaa37e59a8a6e126e1cbc7af9d42f392faa0b6bb53249b436059d0bea782 3.000000000000 295573 of 300495 -
11: 726ad753b1f43e43d58c815f1df19f12195e65778fbe14822d1579f31f360200 6.000000000000 203837 of 207703 -
12: c5cc92f6fe0c1989611f4fb9173b2994b121708d4404a95ec6b572a655acdf16 30.000000000000 47620 of 49201 -
13: f4bf2e2e7a581532cb9a8379ef982269223d1e03a6cde0d73f71e13ec6e366e8 70.000000000000 23684 of 24819 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 110.000000000000 xmr

key image 00: 9e4ad837b0fb102bfbdb9200a8a3f0fc0c7ef4dac32e1e8d354926224dc9ae04 amount: 70.000000000000
ring members blk
- 00: 1bc9552880f372a42c103c892ba538f3be04af124599f557a8b14063a9249ef9 01127917
- 01: a72087ee150c9e5ee0df834f9781bc42b40075156d35350cfdae09763d185fa6 01167787
- 02: 18f18ca962a85d5ec91b8a573cf56b1d895f3bab2bea4e3ae8af1d63d5249824 01213693
key image 01: eb3f3aeb9e56ce784d71ee0b6f9917b01c644552ccbe1c0492979d05b4c6ca82 amount: 40.000000000000
ring members blk
- 00: be71232902ab4b9addf2d21f00e8871c2a51b4d94d0f7604bf6e58283841ec63 01125747
- 01: 0f31d023aab0107e81c4a11607f12b47a3ed1a05ea7e631f397d5bf882d0ec36 01146440
- 02: 5bd9eefbab2626c8cbc375b802bb98ffd56a73ef61b097f792b658fc5a4eb82e 01213651
More details
source code | moneroexplorer