Monero Transaction 13bc14bf1a9f19daa410963eaf8d8c9051e4380f066d3e68b3e7c58158776a7b

Autorefresh is OFF

Tx hash: 13bc14bf1a9f19daa410963eaf8d8c9051e4380f066d3e68b3e7c58158776a7b

Tx public key: 9065aa233e31a5c5422fb2bb00802f1b051ee37a3914d5eaa571bffb2db3c169
Payment id: 6e132cfaeb38a607739483163ccd1d9ad4801f2cb60d78cf9784f9c07e3d4338

Transaction 13bc14bf1a9f19daa410963eaf8d8c9051e4380f066d3e68b3e7c58158776a7b was carried out on the Monero network on 2014-06-07 16:07:41. The transaction has 3203283 confirmations. Total output fee is 0.007200000000 XMR.

Timestamp: 1402157261 Timestamp [UTC]: 2014-06-07 16:07:41 Age [y:d:h:m:s]: 10:158:16:18:50
Block: 74916 Fee (per_kB): 0.007200000000 (0.001470149551) Tx size: 4.8975 kB
Tx version: 1 No of confirmations: 3203283 RingCT/type: no
Extra: 0221006e132cfaeb38a607739483163ccd1d9ad4801f2cb60d78cf9784f9c07e3d4338019065aa233e31a5c5422fb2bb00802f1b051ee37a3914d5eaa571bffb2db3c169

1 output(s) for total of 3.000000000000 xmr

stealth address amount amount idx tag
00: ac718aa533c2df4463bce145f56a858d3969b04c105c2859dcd7b2f228b96da4 3.000000000000 5444 of 300495 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



46 inputs(s) for total of 0.928200000000 xmr

Only 10 inputs are shown. To see all, click "more details"
key image 00: fb82148c6c4d358369fe8d056c45027b3d5841e4e0c6e5caa65e0037d5b05d3f amount: 0.000200000000
ring members blk
- 00: ce5d426a12cdf54b82ec5fe9c4af3ada5fb99059bc471165e297d0090736d0fa 00056163
key image 01: 9204c769effd8b97a5348003ec34d3b23c4ada2896ce5454b554e1f77d409f8f amount: 0.050000000000
ring members blk
- 00: 5e63d19ea7fff80b48b4571f1f0a2de23370cb3b0bfba2f814af04b622096325 00074644
key image 02: 2cbbf138d68fae34a566d87bb77e9cbc71d92d853fdd39a6718df1a0f0f66256 amount: 0.008000000000
ring members blk
- 00: ca0bdb467787f017505215352c6eac8206038b1bab7e8e4272b44826a9117a5e 00074850
key image 03: 9cabda74f2b1fd42b10d075a4e529accaf7ec17ae4d0cf4a5ab4dc2b1a311aa3 amount: 0.100000000000
ring members blk
- 00: 9df011adc18e72e7f50db3645329f7d05eded5f17ec1ce279e9137c7810c0207 00074705
key image 04: 86179717e6cb6bd489389c09ce0e9ef5653f8b07638616cf2e05f3c70786a934 amount: 0.050000000000
ring members blk
- 00: ab363ccbb98e2d6c1db60f0df1d739a5ba1fc581049c55a8e19b23d2578eca72 00074850
key image 05: cec7c456e3d73a6e767332ed536d8922c659504ccd051a102e2fef9c30a15c17 amount: 0.100000000000
ring members blk
- 00: 9b8b74344af57897038b0f32ba3611591c48d83abfe008d061d4086dadc98868 00074257
key image 06: 5a67138a65e63add158e0b59c361304e95c883b29e37a7ee009d8186ad0e16d3 amount: 0.200000000000
ring members blk
- 00: 65d64b7e5682263937ca6937f39738c3d8b151ef556536d95f4daa260c1e14ec 00074850
key image 07: 25ec2224e53c2841bd0e72de64b6531c2fbb170d41855ef6ce2846f004276df5 amount: 0.080000000000
ring members blk
- 00: b25fc6f47092d319caeb749bfcf0e927747ed64c6ba0afc23be49cdc2c18726c 00074024
key image 08: bac9335549007d1745e82ba5fe9339b136bedcd5731954c7fcddf019f944dd65 amount: 0.200000000000
ring members blk
- 00: 4f7184dd985cec388ffce8d4ad219c260fbdff358384468cb818fdeffa8e453e 00074811
key image 09: 7f78e1c1ba1d5a46d75534e8a5150cbde82144f7dc5799b85eceabf4be63769a amount: 0.100000000000
ring members blk
- 00: 2c848f38d81ef4d72fb4c58ea635365dd2b1b5712a3a3b1e52e3bf90de1ba020 00074413
key image 10: 46dd765caa8027e17271dcc9ab1200d6f64094f7ff775fdcfc7203a45b7d80ca amount: 0.040000000000
ring members blk
- 00: f2eddf15d57bf914e75d582bf4e39a83042257aa57d5550dcb3f0fb5603bf2a1 00074881
More details
source code | moneroexplorer