Monero Transaction 13505e4b1e0264a0eca808f12f0eeb56a1c1d4912fe57ed25c78c07ad9c72d0c

Autorefresh is OFF

Tx hash: 13505e4b1e0264a0eca808f12f0eeb56a1c1d4912fe57ed25c78c07ad9c72d0c

Tx prefix hash: 8c7acf902116bc9b9cac7c08c52e5fe66ff30282ffccb0a299662215ca9c7d89
Tx public key: aba37544c5132e260a75adccd1bd5c320678fa8ae66b11d3283c3f8d6f26d48e
Payment id: abd0f73c5aa7ddec093a16b3e1fc4b733ede4996951aea87d7e6d05ebe8979c2

Transaction 13505e4b1e0264a0eca808f12f0eeb56a1c1d4912fe57ed25c78c07ad9c72d0c was carried out on the Monero network on 2014-10-16 01:06:39. The transaction has 3029620 confirmations. Total output fee is 0.198667737579 XMR.

Timestamp: 1413421599 Timestamp [UTC]: 2014-10-16 01:06:39 Age [y:d:h:m:s]: 10:047:16:21:25
Block: 262531 Fee (per_kB): 0.198667737579 (0.214142908717) Tx size: 0.9277 kB
Tx version: 1 No of confirmations: 3029620 RingCT/type: no
Extra: 022100abd0f73c5aa7ddec093a16b3e1fc4b733ede4996951aea87d7e6d05ebe8979c201aba37544c5132e260a75adccd1bd5c320678fa8ae66b11d3283c3f8d6f26d48e

6 output(s) for total of 17.001332262421 xmr

stealth address amount amount idx tag
00: da8f495d27ba05272c99ba8385d15ffe4d1b548cb2bcfd236e1367b3af9354a6 0.001332262421 0 of 1 -
01: 63a5abe16fdabec4d70dba7fb59245da278fbcb140c25e6d2c2bd380fedd6e24 0.400000000000 243984 of 688584 -
02: 8af32203d8ce7ce540efa9c59439637add408d5e01476a92445ff22c93d05802 0.600000000000 238212 of 650760 -
03: 728bf74ca6bc8ca952025e138d9f7ce48f7a2369b0861aa54968b474dea3ac4f 3.000000000000 87582 of 300495 -
04: c1bdebe6ac88af60c7bfce9fad7ff4c199bb798cb9f7483f225be5d21b77cff9 3.000000000000 87583 of 300495 -
05: 571dead25548353205020ab1ce612aa6bab401193e511e786e2409c11a7c10a5 10.000000000000 305828 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-10-14 18:51:13 till 2014-10-15 20:45:07; resolution: 0.01 days)

  • |_______________________________________________________________________________________________________________________*__________________________________________________|
  • |_______*__________________________________________________________________________________________________________________________________________________________________|
  • |___________________________________________________________________________________________________________________________________________________________________*______|
  • |_____________________________________________________________________________*____________________________________________________________________________________________|
  • |_____________________________*____________________________________________________________________________________________________________________________________________|
  • |__________________________________________________________________________________________*_______________________________________________________________________________|

6 inputs(s) for total of 17.200000000000 xmr

key image 00: 2a04fb8120e528200a1100b606576134a81a0b95b2d2639e65d812c589c9b592 amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a1acbad7e71024116d5faf21fc6651ef5a1ed636391db9c4fc7cac66496f9704 00261888 1 6/5 2014-10-15 13:04:44 10:048:04:23:20
key image 01: 273894aa0883a9d57620a0784ce99ad53b324c3c5b93f40ffcbabba90e851d7d amount: 0.800000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 41535415c6e3aec4218ff70881ff5ecc057c519e05521b18003eb7252b6a451d 00260850 1 1/3 2014-10-14 19:51:13 10:048:21:36:51
key image 02: 429019bf19d35f1c421bf5434d64b5f2bb3cecf37fa27d7a03c739af4d3c18ab amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 948d1a2abab5a29c416694e60dc101719422a0b75f310e05b0645ccb111a151a 00262265 1 3/4 2014-10-15 19:45:07 10:047:21:42:57
key image 03: dee5511245b1915551ff1a76383a16eb7cbab02211e99214e382303694248d1e amount: 0.400000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f50cd82d590eb562a8e8ebea772f0759646d8cfd4737dcdd3e4fbb11987c5490 00261449 1 2/5 2014-10-15 06:37:21 10:048:10:50:43
key image 04: bfad036dcb9bd75268ae6418d1458d0a9af00915fd68a5a132afb42c6c558e61 amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a02449385120cccd1c5d813fb5140aa0b98046b7fdae39fade1a212f0aa49403 00261024 1 1/4 2014-10-14 23:14:28 10:048:18:13:36
key image 05: 3d01d81103cdbfe4269750bc30ca9b37f7105a6b24033f5b6d567006ea03e290 amount: 8.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c4e987b6e1433227c1e8852034a56dd5e61c170e1b4472bdb6270c6caab0c205 00261596 1 6/6 2014-10-15 08:33:47 10:048:08:54:17
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 2000000000000, "key_offsets": [ 116573 ], "k_image": "2a04fb8120e528200a1100b606576134a81a0b95b2d2639e65d812c589c9b592" } }, { "key": { "amount": 800000000000, "key_offsets": [ 181378 ], "k_image": "273894aa0883a9d57620a0784ce99ad53b324c3c5b93f40ffcbabba90e851d7d" } }, { "key": { "amount": 3000000000000, "key_offsets": [ 87275 ], "k_image": "429019bf19d35f1c421bf5434d64b5f2bb3cecf37fa27d7a03c739af4d3c18ab" } }, { "key": { "amount": 400000000000, "key_offsets": [ 243380 ], "k_image": "dee5511245b1915551ff1a76383a16eb7cbab02211e99214e382303694248d1e" } }, { "key": { "amount": 3000000000000, "key_offsets": [ 85861 ], "k_image": "bfad036dcb9bd75268ae6418d1458d0a9af00915fd68a5a132afb42c6c558e61" } }, { "key": { "amount": 8000000000000, "key_offsets": [ 21269 ], "k_image": "3d01d81103cdbfe4269750bc30ca9b37f7105a6b24033f5b6d567006ea03e290" } } ], "vout": [ { "amount": 1332262421, "target": { "key": "da8f495d27ba05272c99ba8385d15ffe4d1b548cb2bcfd236e1367b3af9354a6" } }, { "amount": 400000000000, "target": { "key": "63a5abe16fdabec4d70dba7fb59245da278fbcb140c25e6d2c2bd380fedd6e24" } }, { "amount": 600000000000, "target": { "key": "8af32203d8ce7ce540efa9c59439637add408d5e01476a92445ff22c93d05802" } }, { "amount": 3000000000000, "target": { "key": "728bf74ca6bc8ca952025e138d9f7ce48f7a2369b0861aa54968b474dea3ac4f" } }, { "amount": 3000000000000, "target": { "key": "c1bdebe6ac88af60c7bfce9fad7ff4c199bb798cb9f7483f225be5d21b77cff9" } }, { "amount": 10000000000000, "target": { "key": "571dead25548353205020ab1ce612aa6bab401193e511e786e2409c11a7c10a5" } } ], "extra": [ 2, 33, 0, 171, 208, 247, 60, 90, 167, 221, 236, 9, 58, 22, 179, 225, 252, 75, 115, 62, 222, 73, 150, 149, 26, 234, 135, 215, 230, 208, 94, 190, 137, 121, 194, 1, 171, 163, 117, 68, 197, 19, 46, 38, 10, 117, 173, 204, 209, 189, 92, 50, 6, 120, 250, 138, 230, 107, 17, 211, 40, 60, 63, 141, 111, 38, 212, 142 ], "signatures": [ "f0e91a7c7cda02d9a24decf6db6a08c54f5abbac16977fd912e3b66a68c0800cafaa22a6d1a0e3c815f94aaeab62dd6ff3d641f059e36093f89741ee6209e908", "d1af9de87ef23f8b48bdb2682b3079b69f6e7159b7e4f922ae5131b24ea97e0181fe99b9591572b0f81f84fd5b6e599350f5496ba7704dc86ddb7ca58bfed800", "261127de04481f94d413f5ae4ef8a73fcc8a9e42bc2e7549a52c94add55f8e02c471ef52c0a0944b4967f1118ed412ad9a149aacf355dc8ce259baca91a0c40b", "04a4c91ca64d9a5093a73aa175f40d62746033bcac7f3cf7b58a193edeebf00960b55e2c3c66ce8e59a31477e7053caa5661afc6c109b4829248b0ed32901b02", "908c7fc6dc4326523d5e9acda46967e71cfdeeb3441d09639ef9a152b9957801d3e45a304f0adf9e096df926b04ceda8de7a7a5f2d9c9ba3a12a09883d5b4906", "1dc938728c8cb53588ef9f7dfa19ba75a1a5cd6c3331ad08d271b4818df7d60756ba2587403a0648b7098c5e070bc9c2bdf13c466e4e3e25148839831ccd840c"] }


Less details
source code | moneroexplorer