Monero Transaction 13c34e0a229909515a695f8b5031c10e5cd63a634eb6924c3744f2f5cdbc45d6

Autorefresh is OFF

Tx hash: 13c34e0a229909515a695f8b5031c10e5cd63a634eb6924c3744f2f5cdbc45d6

Tx prefix hash: c0f450ec4576897ebab9d2397a4d57036c11f8f30fac3e34914fde2d655e3b53
Tx public key: b535110026f59fee9674cc47b5eab22de7012517f7237653b284d1244391e511
Payment id: 9a1dc5fec219a5882f463dfa519e6d2ec0d9499c25bd1e28df50ff5156368d86

Transaction 13c34e0a229909515a695f8b5031c10e5cd63a634eb6924c3744f2f5cdbc45d6 was carried out on the Monero network on 2014-07-09 10:00:15. The transaction has 3157645 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1404900015 Timestamp [UTC]: 2014-07-09 10:00:15 Age [y:d:h:m:s]: 10:127:11:52:28
Block: 120959 Fee (per_kB): 0.010000000000 (0.030295857988) Tx size: 0.3301 kB
Tx version: 1 No of confirmations: 3157645 RingCT/type: no
Extra: 0221009a1dc5fec219a5882f463dfa519e6d2ec0d9499c25bd1e28df50ff5156368d8601b535110026f59fee9674cc47b5eab22de7012517f7237653b284d1244391e511

4 output(s) for total of 9.990000000000 xmr

stealth address amount amount idx tag
00: a57327260b1788e76069130f90868dce2ebed5e84e82eae67b98179e39c50c96 0.090000000000 76807 of 317822 -
01: 883bbeeff77b95b76e39f446a7be6daa779a012a5fcde918af9a7adc17a73c42 0.900000000000 49007 of 454894 -
02: 3420d722f0ff4ec6847bcaf7c8ea71d06cf50d91d775e354d21cc5ad6fa88ed8 1.000000000000 87030 of 874629 -
03: 48b69416a27d36bc2fb47d3d54b7b456ddb0493369639e63682e0df1b42277ae 8.000000000000 8164 of 226902 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-08 00:35:22 till 2014-07-08 02:35:22; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|

1 inputs(s) for total of 10.000000000000 xmr

key image 00: 3d81a5e1df971578260f39388470d2f5e2d3f98d54b8ea5b3407882d6f4c9917 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8e365d5b9c3075ace4c1735c1d5cec0d033e0dd5768fbda29a7a1e934dde074e 00119031 1 3/6 2014-07-08 01:35:22 10:128:20:17:21
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 10000000000000, "key_offsets": [ 132989 ], "k_image": "3d81a5e1df971578260f39388470d2f5e2d3f98d54b8ea5b3407882d6f4c9917" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "a57327260b1788e76069130f90868dce2ebed5e84e82eae67b98179e39c50c96" } }, { "amount": 900000000000, "target": { "key": "883bbeeff77b95b76e39f446a7be6daa779a012a5fcde918af9a7adc17a73c42" } }, { "amount": 1000000000000, "target": { "key": "3420d722f0ff4ec6847bcaf7c8ea71d06cf50d91d775e354d21cc5ad6fa88ed8" } }, { "amount": 8000000000000, "target": { "key": "48b69416a27d36bc2fb47d3d54b7b456ddb0493369639e63682e0df1b42277ae" } } ], "extra": [ 2, 33, 0, 154, 29, 197, 254, 194, 25, 165, 136, 47, 70, 61, 250, 81, 158, 109, 46, 192, 217, 73, 156, 37, 189, 30, 40, 223, 80, 255, 81, 86, 54, 141, 134, 1, 181, 53, 17, 0, 38, 245, 159, 238, 150, 116, 204, 71, 181, 234, 178, 45, 231, 1, 37, 23, 247, 35, 118, 83, 178, 132, 209, 36, 67, 145, 229, 17 ], "signatures": [ "e30b7f8b2c30fc176c044b0a59bdc6a62288dce3aa05af131f326c4cc4c51d0bd48770c903ffa4844a99c2fe8e76c4cd5b797fc549c926ccc1a21254b2852607"] }


Less details
source code | moneroexplorer