Monero Transaction 13bd66cb3d4d8d54fbebfaea9a1c7223ce77a027465e9dc147ac9904aed8f8ca

Autorefresh is OFF

Tx hash: 13bd66cb3d4d8d54fbebfaea9a1c7223ce77a027465e9dc147ac9904aed8f8ca

Tx public key: a0cc465340bf7f57e40e87c594fcf5f03076f8b8791f79217bb138b37c9b42c2
Payment id: 6daf51f09bc63b78c53a7f51216d38fdbc32e83ce30e4cd0bfcba2b386948774

Transaction 13bd66cb3d4d8d54fbebfaea9a1c7223ce77a027465e9dc147ac9904aed8f8ca was carried out on the Monero network on 2016-12-27 08:52:52. The transaction has 2093083 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1482828772 Timestamp [UTC]: 2016-12-27 08:52:52 Age [y:d:h:m:s]: 07:355:04:50:33
Block: 1210442 Fee (per_kB): 0.010000000000 (0.011203501094) Tx size: 0.8926 kB
Tx version: 1 No of confirmations: 2093083 RingCT/type: no
Extra: 01a0cc465340bf7f57e40e87c594fcf5f03076f8b8791f79217bb138b37c9b42c20221006daf51f09bc63b78c53a7f51216d38fdbc32e83ce30e4cd0bfcba2b386948774de20eddaacbe4643585049f3e483f61e6ea632c49a71d69bb66fb36a1fb0e032d15b

15 output(s) for total of 2.990000000000 xmr

stealth address amount amount idx tag
00: c7d2d0963e90aef7952f9da377843ddecdce627b18a0709ae4c5264e933f78d2 0.000000400000 17163 of 22961 -
01: 7f5eb36c661e2cca43bbc526a854413248021f93328c17ffe5e2f77e9652ff60 0.000000600000 16799 of 22711 -
02: f67dd56a471bcf098ec98382e5fc13c991364ba36cd8e8655559caf4344b81bb 0.000004000000 35622 of 41587 -
03: bb52a073fd4c09c8bd4294c720255eb29455f4d124bb12f08869cbbc10a7221a 0.000005000000 36480 of 42488 -
04: 2f29b0ac340170f64b96a3d39077aabff6f31e809efedbed0fd91542e872bf07 0.000030000000 53427 of 59485 -
05: 5ea5f5c2b1c417cf0cd176637f345d5b330c1f6689b6d0aac2384954e3ef22fc 0.000060000000 53118 of 59217 -
06: 3aa1b5a341f929af7faa1e8ddc87be42c4ee85b8ee4955b7c3b9608ec0fc5b58 0.000300000000 71009 of 78258 -
07: 954663b21aadf0ce79caec92330894528c3d1a3ada015d948debcb95401d006b 0.000600000000 70586 of 77842 -
08: 6f152e3adbbed1e0b69b93f1c7566f96abe526e70d2c45d297575ef259b5ec55 0.002000000000 85129 of 95916 -
09: 4e92fb2dedf3f67df6609ad0e883fb4c44781dd82ebafc388d544c215a61444d 0.007000000000 236353 of 247341 -
10: 499704e0dde902749ca434ce0cf526ad5eafae5bc982ee3c0713b037b887e781 0.020000000000 369509 of 381492 -
11: 7b6692f95ca3b92b3851b8ed27c6851f39a2267ca52da31c31591a2fa3a6ac7e 0.060000000000 254419 of 264760 -
12: 5bcafdc1f341e5b0c3be44f0bdc318ea20fd6dde5e50d21814a917aaf60bac98 0.300000000000 952431 of 976536 -
13: 5a0e185b4fba9a8a9aace886c979e161fa831694d51904ef7963268552bf1e7b 0.600000000000 640641 of 650760 -
14: 36efb96797b67cf26e93d9c389746a9855177790a4e338fe90326a575728aa9a 2.000000000000 425546 of 434058 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



1 inputs(s) for total of 3.000000000000 xmr

key image 00: c367198159713b660ddaabee6653240051b56a7f7494e0c357552eea3ae0e4d5 amount: 3.000000000000
ring members blk
- 00: af01736403465a5d7248ab896a4463084621c5a4306407698f547e93a8f4e030 00306640
- 01: 96b38d60a98f737a2688fecdde5356b16e631bb8b349e0758d00624ee1f7f717 00879845
- 02: 1437d7781696ba39c75b8dff85b564c13400aa2ce60763a31796577f84b133e4 01210082
More details
source code | moneroexplorer