Monero Transaction 3fa13da9f4736234cf1bf3c5d65ed46b9c2b2b5ad729773441d811e282219ce8

Autorefresh is OFF

Tx hash: 3fa13da9f4736234cf1bf3c5d65ed46b9c2b2b5ad729773441d811e282219ce8

Tx public key: feccdfb0b5b127db5a1760354883212b1c1f7e5318070666fe632afbb7c91672

Transaction 3fa13da9f4736234cf1bf3c5d65ed46b9c2b2b5ad729773441d811e282219ce8 was carried out on the Monero network on 2014-06-12 00:19:50. The transaction has 3197303 confirmations. Total output fee is 0.005237326012 XMR.

Timestamp: 1402532390 Timestamp [UTC]: 2014-06-12 00:19:50 Age [y:d:h:m:s]: 10:154:17:19:25
Block: 81190 Fee (per_kB): 0.005237326012 (0.004304190880) Tx size: 1.2168 kB
Tx version: 1 No of confirmations: 3197303 RingCT/type: no
Extra: 01feccdfb0b5b127db5a1760354883212b1c1f7e5318070666fe632afbb7c91672

29 output(s) for total of 0.994762673988 xmr

stealth address amount amount idx tag
00: 0729d26d69bc7d84be7865b5f8f30c21886694852c0034e610a5b6a75d6e1c7d 0.000267544977 0 of 8 -
01: a646e2fcc95b5f86375f144624d0578fe225c24428ca5aaa3a10d9e7ab4de00f 0.000267544977 1 of 8 -
02: 7967efb7e0ae0ada6677c73aaaa0296e4a69712479e389dcbda5bdd2db5871c8 0.000535089955 0 of 9 -
03: f7c71870bb8af0d3b3bebf5668862d651a9dc20caa0156785d3483a7709756e4 0.000535089955 1 of 9 -
04: 21e8c9f5268c771d737797b9218899be7099bd902f51af95e8b1e8dcddbf60dd 0.000535089955 2 of 9 -
05: 4bee723e69b17360ddce314a3051343ff480832ed0a2acd2d93a160ed5ae8c7a 0.000535089955 3 of 9 -
06: d2ff620912b932aeb42cd63453e0896960645ca0be0791543066fd69f2c9ca49 0.000535089955 4 of 9 -
07: b7ffb8db2e59fb829ec15e5ccef0e9a7d874dfe37dc277d07a32fde0dcc625f3 0.000636209519 0 of 1 -
08: 24fe21378fad0accfcaafc7548599a7ec5a5e9f212bd30fe9448005a66a82ef7 0.000718090720 0 of 1 -
09: ae994f8f3f7eea529fcacb0ee8c3e7d18a1a318168fd4ea8ff7cdaad4bc185f0 0.000802634933 0 of 4 -
10: 305c10545c1632c06af70e9a3dd2b13f0f0ee98ab57386fd3305b42bb943e632 0.000802634933 1 of 4 -
11: b764b6efe7e0eeb8072ab5ff4d1aa09c49ef612234498c87e11a7052a5544a03 0.000899164176 0 of 1 -
12: 31fd3332305cdf143fafb5ae00c8cf8406bfa4a5a7e1a8c4fec38c74fe5e0f7a 0.001070179910 0 of 7 -
13: 5f753ed837e2cb891da6f06b6e21dde7bf37dbbec74222243424e4dac3b333e4 0.001070179910 1 of 7 -
14: 2a0c9fd99c5e4ab893eb7f93d1f17278aedf71a544182e61c0934fd85f028ba1 0.001316749362 0 of 1 -
15: 9ec57ed7be15d8aa60e29993385fc96ee53f213ce8012fe31defc185754dd224 0.001337724888 0 of 3 -
16: 0e86dfbafaa5f8ffd4f1bb6b92aaa5f6b1273308e363f78d692160c826661c0c 0.001872814844 0 of 4 -
17: 4423d31bcf417a72b9d13603029589bc3a16c097866691581adb15bc58920b72 0.001938688174 0 of 1 -
18: b53438a2abf648896be8480123eb565c82e355419256a450b8758f8c68adfc90 0.002429094361 0 of 1 -
19: 8e0cc2d79f0bd36f970aae920bbafce9d9480858f90e92d7d4e28392db66b103 0.003745629688 0 of 3 -
20: b31989b6368890508e18143fbd627683b2b148447481d977b7d4bc5c7026d0b3 0.004548264621 0 of 3 -
21: f72bc4d6d058d64ee27c2c94b0e2c56952e99a2390250c388843e4352eea1f5c 0.004548264621 1 of 3 -
22: 93b2b3d1c6492a24d455bf7e2409245ec5bb29876ddbaab04e4fcd220bcfe0e1 0.004815809599 0 of 1 -
23: 97af157e70a3df9390d0c96fc3c915d7698a3d41b2a7562356ce90aaaf3092d0 0.005000000000 92812 of 308584 -
24: b7f85fa27a66e8419a3a7f23ad73382f0d8a72fa3975cc46be50dd7395579ad1 0.005000000000 92813 of 308584 -
25: 5966af779baca46330ca5ab0702f0f10da16d1910bb2d4229fec72ad96913644 0.009000000000 76566 of 233398 -
26: 72b50dfc22310de73dd129c571ec6c2e27d94039b2b109aea4348f20bda29fac 0.020000000000 101695 of 381491 -
27: 59df25427b14638d2867e50d5c51e5ba01e65c7886a47231143070f8357ae09f 0.020000000000 101696 of 381491 -
28: e70344a747bdf7f1fee0b9f51e6a1a1e09813754adb4db0b9242e1d966201789 0.900000000000 15405 of 454894 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



1 inputs(s) for total of 1.000000000000 xmr

key image 00: f38d96bc97f5a855553f00e8d9d8cf662c9fcc9eb9ffa11a535130883f805d6d amount: 1.000000000000
ring members blk
- 00: 31731bafe500708f274545814e36fc81fff0b409b83da638dacd8419d522b15d 00081174
More details
source code | moneroexplorer