Monero Transaction 13d3f8446f8461fdc4e3d4814448a032be03dca9d0588705c3c4f379e671f4d4

Autorefresh is OFF

Tx hash: 13d3f8446f8461fdc4e3d4814448a032be03dca9d0588705c3c4f379e671f4d4

Tx prefix hash: bf68fcb3e4f8826811a34353421d67186d5c72caeaac9ee295743e8411df0a93
Tx public key: 6dfd7d852d9a6c18f7728b84c68833b0c26227a75fd9962f0f0588f65d56ad6e

Transaction 13d3f8446f8461fdc4e3d4814448a032be03dca9d0588705c3c4f379e671f4d4 was carried out on the Monero network on 2016-02-11 15:09:57. The transaction has 2344123 confirmations. Total output fee is 0.025024832491 XMR.

Timestamp: 1455203397 Timestamp [UTC]: 2016-02-11 15:09:57 Age [y:d:h:m:s]: 08:299:08:08:29
Block: 951800 Fee (per_kB): 0.025024832491 (0.025936668493) Tx size: 0.9648 kB
Tx version: 1 No of confirmations: 2344123 RingCT/type: no
Extra: 016dfd7d852d9a6c18f7728b84c68833b0c26227a75fd9962f0f0588f65d56ad6e

11 output(s) for total of 7.978595720000 xmr

stealth address amount amount idx tag
00: efcedeae1ce89d882adaa6c2f885323b3462a0f2e153cd8455d3673754e3e39b 0.000000020000 484 of 22914 -
01: 61d396ade79f72e3b77ec337fd21b02e7d963ecfb70b16f567da83773d680c0a 0.000000700000 472 of 22578 -
02: 319d83aa73a78e4aa5baafb2d8c01874e1eb734258468cc52ff2c87decf07e1b 0.000005000000 19407 of 42488 -
03: 32c122922491a7fc382be9852afb51c1d0f00fdebf3cf2bc91d3a40143404248 0.000090000000 37236 of 61123 -
04: f39d7c7e27b8ee35ab99258b1b992dbc6f0c432d3a2084c00c62ad37f9a7809e 0.000500000000 36199 of 77939 -
05: f575c3874cf560f2ac2bbdf24bd782380939a66f82ce8cb3179fc80ef70f83c1 0.008000000000 187486 of 245068 -
06: e2a32502843dacfab1c4794ad32a9c42f7f42799874be25fe89ca5df42eea4d8 0.020000000000 304789 of 381492 -
07: 778e1e45e1ac1ad5b8aaf1b5a7cbc2fc86ae75fa900a42d83029e66826bb66c1 0.050000000000 206749 of 284521 -
08: ec82df38c911d57f128831a3e80558c1372903ee4949567f949dc9845702f311 0.100000000000 861176 of 982315 -
09: 40b0ebbb6b705ec8f0a5d6cdefbf3b1ceba7f9fe2ca72ee4a30f44b75c63a610 0.800000000000 380734 of 489955 -
10: bcb33209d1aa3c91e2376e1abeb42f56ec386a492704109e9467133a3988f928 7.000000000000 224878 of 285521 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2016-01-17 07:19:41 till 2016-02-11 00:55:53; resolution: 0.15 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |___________________________________________________________________________________________________________*______________________________________________________________|
  • |___________________________________________________________________________________________________________________________________________________________*______________|
  • |_______________________________________________________________________________________________________________________________________*__________________________________|

5 inputs(s) for total of 8.003620552491 xmr

key image 00: 23d6b99cfc25143efdfc1919d2a65c4c5dc11c033b624d033f2e42df26c651d7 amount: 0.003620552491
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5b702d6d51bdd851b7e7678085ebabc4daf9e8cd976b9024a3c92830db2a1da4 00915949 0 0/4 2016-01-17 08:19:41 08:324:14:58:45
key image 01: 1eb4061f9bcedd37f1514e1fc98be5ab79b6ec4326812ea8aad5b2b3a950703d amount: 0.060000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e51f27f5860f5a030e3f66aecdf7c5a2a21c8cb4979d721a03fdcda7437f151d 00950856 1 4/11 2016-02-10 23:55:53 08:299:23:22:33
key image 02: 16b7dc6f69f90c9670a62cb9c9841bfe613a9e5235f48e0fd9b917d0052f890b amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0ec85bace4e196ffaf3ee626f51e9b5f3136568b0997a9b2ad8f6ff501d5ed2c 00938011 1 13/9 2016-02-01 22:04:09 08:309:01:14:17
key image 03: 5d4411cb0964b94c622a96c1433ad69d5c2efb1a2e8bb8ca06c1b43a161e368d amount: 0.040000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0f975576879b4a559340bdc39b27e2be2cf0d5e984cb36d2de81c0977e623029 00947822 0 0/4 2016-02-08 20:18:11 08:302:03:00:15
key image 04: 18d712a144a3e399390b630e7ec321445f87bfbe3381222b517c8fd1140c4670 amount: 7.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: bfcac168ad4bd8b4bf0af9a1da5f3b203ca30e7a387ef83b07125df026450eb5 00943775 0 0/4 2016-02-06 00:56:46 08:304:22:21:40
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 3620552491, "key_offsets": [ 0 ], "k_image": "23d6b99cfc25143efdfc1919d2a65c4c5dc11c033b624d033f2e42df26c651d7" } }, { "key": { "amount": 60000000000, "key_offsets": [ 192133 ], "k_image": "1eb4061f9bcedd37f1514e1fc98be5ab79b6ec4326812ea8aad5b2b3a950703d" } }, { "key": { "amount": 900000000000, "key_offsets": [ 331721 ], "k_image": "16b7dc6f69f90c9670a62cb9c9841bfe613a9e5235f48e0fd9b917d0052f890b" } }, { "key": { "amount": 40000000000, "key_offsets": [ 219575 ], "k_image": "5d4411cb0964b94c622a96c1433ad69d5c2efb1a2e8bb8ca06c1b43a161e368d" } }, { "key": { "amount": 7000000000000, "key_offsets": [ 216275 ], "k_image": "18d712a144a3e399390b630e7ec321445f87bfbe3381222b517c8fd1140c4670" } } ], "vout": [ { "amount": 20000, "target": { "key": "efcedeae1ce89d882adaa6c2f885323b3462a0f2e153cd8455d3673754e3e39b" } }, { "amount": 700000, "target": { "key": "61d396ade79f72e3b77ec337fd21b02e7d963ecfb70b16f567da83773d680c0a" } }, { "amount": 5000000, "target": { "key": "319d83aa73a78e4aa5baafb2d8c01874e1eb734258468cc52ff2c87decf07e1b" } }, { "amount": 90000000, "target": { "key": "32c122922491a7fc382be9852afb51c1d0f00fdebf3cf2bc91d3a40143404248" } }, { "amount": 500000000, "target": { "key": "f39d7c7e27b8ee35ab99258b1b992dbc6f0c432d3a2084c00c62ad37f9a7809e" } }, { "amount": 8000000000, "target": { "key": "f575c3874cf560f2ac2bbdf24bd782380939a66f82ce8cb3179fc80ef70f83c1" } }, { "amount": 20000000000, "target": { "key": "e2a32502843dacfab1c4794ad32a9c42f7f42799874be25fe89ca5df42eea4d8" } }, { "amount": 50000000000, "target": { "key": "778e1e45e1ac1ad5b8aaf1b5a7cbc2fc86ae75fa900a42d83029e66826bb66c1" } }, { "amount": 100000000000, "target": { "key": "ec82df38c911d57f128831a3e80558c1372903ee4949567f949dc9845702f311" } }, { "amount": 800000000000, "target": { "key": "40b0ebbb6b705ec8f0a5d6cdefbf3b1ceba7f9fe2ca72ee4a30f44b75c63a610" } }, { "amount": 7000000000000, "target": { "key": "bcb33209d1aa3c91e2376e1abeb42f56ec386a492704109e9467133a3988f928" } } ], "extra": [ 1, 109, 253, 125, 133, 45, 154, 108, 24, 247, 114, 139, 132, 198, 136, 51, 176, 194, 98, 39, 167, 95, 217, 150, 47, 15, 5, 136, 246, 93, 86, 173, 110 ], "signatures": [ "f490c4717426b7eae0a9225c226f1a6de8d680d1f3403f4679e989e5a44bf207d8bf01b206c4649d413d74fa0109f65aa8dfc75b576dfd1d3a7bad3939378d0f", "23d630239c36f9ce1a5dcbb56688b006def1887136be222b851c45f6c3560905d97c6e9b11732bb38acd77f7712dc24d59fe96aab3e436f9b12d1c7cf192810a", "5ea5b3aa1b5780ce40219b5fdf328cc195a800d8ce9498d85ae0cb5a00a9340ff058a02ca9014b2c36df12a083c70de2ac09daf6d01f6059f3c93ce486047200", "7593af7785eaab1ad067278d3098058389996807bdfd76e280552a55582f6d09fc927ef5016d5edb55eb49ae49b86906a7fc325e21abca9927583571afc4b20e", "76a4a2a13b1fe1c64ce3148542b80c86a69f7cf2181b418e338f80c675b0d20e1269038e73d8a60040ee82472240331390495b5e27b8cdf29635224992595707"] }


Less details
source code | moneroexplorer