Monero Transaction 13bcb706dd43314e75623dc3220b50c3322a9630415f0798d4752772e7e82d0c

Autorefresh is OFF

Tx hash: 13bcb706dd43314e75623dc3220b50c3322a9630415f0798d4752772e7e82d0c

Tx prefix hash: 81ffc55757e1f36904fc0dbf1bb978f22a2b0b6265bad745f5f81c596cb113d6
Tx public key: 579af8f30051c037dae45d2d36990fa4f8300c2745ea4c21738e97abdf0ec139
Payment id: 6d0f6133164f52ae51c2e52ae13263ef42468eca4d769b0f73fb602800687619

Transaction 13bcb706dd43314e75623dc3220b50c3322a9630415f0798d4752772e7e82d0c was carried out on the Monero network on 2014-11-17 08:53:06. The transaction has 2993182 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1416214386 Timestamp [UTC]: 2014-11-17 08:53:06 Age [y:d:h:m:s]: 10:028:19:02:43
Block: 308622 Fee (per_kB): 0.010000000000 (0.012688971499) Tx size: 0.7881 kB
Tx version: 1 No of confirmations: 2993182 RingCT/type: no
Extra: 0221006d0f6133164f52ae51c2e52ae13263ef42468eca4d769b0f73fb60280068761901579af8f30051c037dae45d2d36990fa4f8300c2745ea4c21738e97abdf0ec139

5 output(s) for total of 14.690000000000 xmr

stealth address amount amount idx tag
00: 1f70990087487e1192f9a1f35d15a75f005ad0dfaf6ac0b5b629aff16c39ea79 0.090000000000 122925 of 317822 -
01: dfe4a9e36e477cd946aee5a5022e4d16804039580eddeb8ea8fe9e365e60900c 0.100000000000 633766 of 982315 -
02: 9285594ea958eddb4a28f3089e39c3994e6943ddf39a43cf52007c2a6d5bab5c 0.500000000000 462629 of 1118624 -
03: 17fdee85fba1c8a8f42fb516f3c3c64824192807213a6eeca934d8fa977ee5ab 7.000000000000 61024 of 285521 -
04: 71206b40c0406417f42df81fd6e2b15ea4ef6a2d77f330e6fd1edf8604846cb2 7.000000000000 61025 of 285521 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-11-17 02:19:35 till 2014-11-17 09:34:27; resolution: 0.00 days)

  • |__________________________________________________________________________________________________________________________________________________*_______________________|
  • |________________________*_________________________________________________________________________________________________________________________________________________|
  • |__________________________________________________________________________________________________________________________________________________*_______________________|
  • |________________________________________________________________________________________________________________________________________________*_________________________|
  • |__________________________________________________________________________________________________________________________________________________*_______________________|

5 inputs(s) for total of 14.700000000000 xmr

key image 00: f65258f6d4ab3782a866885b8f52903b80dc7feaebabb57181bda1877bf1520b amount: 0.600000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 80240079ece6a390d9002ecb8fde1391af0dd86963ee53e01bef1d7f6d442096 00308602 1 8/6 2014-11-17 08:34:27 10:028:19:21:22
key image 01: dfe30fe0f3687e9ed73266874975e948887e020fd25baa71f1ec2b122281a201 amount: 0.400000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e38997d90e98cd4d295fa5b50c6ca9c82046ef41900751618a456bffa72a939e 00308251 1 2/68 2014-11-17 03:19:35 10:029:00:36:14
key image 02: 72bd5adfca04951c0d08ed041ed8e651e140dfc18bc058f19516280a3f586245 amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c4f88514540e0bcda157210507c45ee68a3db69468e6c9dee15413980490a7fe 00308602 1 7/6 2014-11-17 08:34:27 10:028:19:21:22
key image 03: 5b5406cf5ffe7f57117b0cb19a3cb0879fdd9b22fdf0cbf8f8d8ad5d7d7fcc16 amount: 0.700000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0caf9f69f05c9d0409413e758b3b4b566b77a936a86a15f615bfcc6f0f26eaf1 00308593 1 3/5 2014-11-17 08:27:54 10:028:19:27:55
key image 04: 76c87f1766ff45156b88c54fb7bb4c684f4335cd60eb88a5a4b1df5e523c9af0 amount: 8.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9ff1b7069bbf77f1b49abbff034f9495faecc823f0e90031bffd299e0d0c3e7d 00308602 1 15/5 2014-11-17 08:34:27 10:028:19:21:22
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 600000000000, "key_offsets": [ 278707 ], "k_image": "f65258f6d4ab3782a866885b8f52903b80dc7feaebabb57181bda1877bf1520b" } }, { "key": { "amount": 400000000000, "key_offsets": [ 278239 ], "k_image": "dfe30fe0f3687e9ed73266874975e948887e020fd25baa71f1ec2b122281a201" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 124638 ], "k_image": "72bd5adfca04951c0d08ed041ed8e651e140dfc18bc058f19516280a3f586245" } }, { "key": { "amount": 700000000000, "key_offsets": [ 203135 ], "k_image": "5b5406cf5ffe7f57117b0cb19a3cb0879fdd9b22fdf0cbf8f8d8ad5d7d7fcc16" } }, { "key": { "amount": 8000000000000, "key_offsets": [ 24241 ], "k_image": "76c87f1766ff45156b88c54fb7bb4c684f4335cd60eb88a5a4b1df5e523c9af0" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "1f70990087487e1192f9a1f35d15a75f005ad0dfaf6ac0b5b629aff16c39ea79" } }, { "amount": 100000000000, "target": { "key": "dfe4a9e36e477cd946aee5a5022e4d16804039580eddeb8ea8fe9e365e60900c" } }, { "amount": 500000000000, "target": { "key": "9285594ea958eddb4a28f3089e39c3994e6943ddf39a43cf52007c2a6d5bab5c" } }, { "amount": 7000000000000, "target": { "key": "17fdee85fba1c8a8f42fb516f3c3c64824192807213a6eeca934d8fa977ee5ab" } }, { "amount": 7000000000000, "target": { "key": "71206b40c0406417f42df81fd6e2b15ea4ef6a2d77f330e6fd1edf8604846cb2" } } ], "extra": [ 2, 33, 0, 109, 15, 97, 51, 22, 79, 82, 174, 81, 194, 229, 42, 225, 50, 99, 239, 66, 70, 142, 202, 77, 118, 155, 15, 115, 251, 96, 40, 0, 104, 118, 25, 1, 87, 154, 248, 243, 0, 81, 192, 55, 218, 228, 93, 45, 54, 153, 15, 164, 248, 48, 12, 39, 69, 234, 76, 33, 115, 142, 151, 171, 223, 14, 193, 57 ], "signatures": [ "eaca7d4a5a195dd392373f7889332eeb0f8508ba127e10a8e8c53772cf08de02af76d21dd6dd44ef60b209ce68e34fdbc0d428c5c0e535f6d9de4a83a3332304", "f05a4429e6682c375be1057f55d2fa18739cc16fc64f4a2d84fd6725f44fac03fae28af75b51e7580dab24e437a6e1a88feb94a58923cf6048630d408604e008", "0d756113f9a6057a4b87bf665661fd7ef47c4048ea0388cac6688b1953727c037d4b44f1d10d8426018c22deeb4dbd07d9469d70c0c710433c1827c512a95602", "06a44fb5328020ce4b3f027135aa0797793e658d05a558f0d87dcb9dd0406e079f8b1043f328760d8ec7bc2cf038682e0d196f6df1794a77be26bce0f71bb10f", "116d6c9faf8a9afa103ad46e64c8d5eec1a9256abd83983c7e056c74a11faf0ffff9b68402766efd8e154e0b091c87f59600482f769b9bde1ca0bbc240a24002"] }


Less details
source code | moneroexplorer