Monero Transaction b138b84ee1aa7e9593a00ad30d31861bf8a81084e6d05b9f79605b9fafacbe16

Autorefresh is OFF

Tx hash: b138b84ee1aa7e9593a00ad30d31861bf8a81084e6d05b9f79605b9fafacbe16

Tx public key: 5cdc0dc5fe6dd1f3e2ff7058621cd8364c0190b35ae5f7406dccfe54746be30a
Payment id (encrypted): e817e5a9a918a0fb

Transaction b138b84ee1aa7e9593a00ad30d31861bf8a81084e6d05b9f79605b9fafacbe16 was carried out on the Monero network on 2020-10-09 12:30:37. The transaction has 1084802 confirmations. Total output fee is 0.000023960000 XMR.

Timestamp: 1602246637 Timestamp [UTC]: 2020-10-09 12:30:37 Age [y:d:h:m:s]: 04:048:07:26:39
Block: 2204535 Fee (per_kB): 0.000023960000 (0.000009429301) Tx size: 2.5410 kB
Tx version: 2 No of confirmations: 1084802 RingCT/type: yes/4
Extra: 015cdc0dc5fe6dd1f3e2ff7058621cd8364c0190b35ae5f7406dccfe54746be30a020901e817e5a9a918a0fb

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: bdc89cfacb94ae11f1a0082a511dd7923a5cae2e335956634dd30d47b9375af7 ? 21632021 of 120186540 -
01: 6cf122002007b5f5a088efa123e3e9f62c071305dc1d1a5562e7371f4fae273d ? 21632022 of 120186540 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 input(s) for total of ? xmr

key image 00: a6e2593d40cdf4efdee222dd6d8e76237bbd32cf3c5fb9d42250a3a1e665355e amount: ?
ring members blk
- 00: c40fe61ae7e526babfc6b9cb7567b877832679677b1ddbefc6ad0c7b820d681e 02196393
- 01: fb1eb07cc760527bdc34c561929f47ef6455119f4aa67f7c2f0d28c2b1996fa1 02197655
- 02: 3f709e04a225cdb53a86a1dd4b5228c85a0013deea11367a688f83820c6d9c5b 02198563
- 03: 83f26fff049f0e035d87ec66b42beb1be830df419525380938bd3f71a31ea624 02202012
- 04: 81b750491733f677737415542ecb87669092778295184c68b9082ec91108865d 02203270
- 05: af1652eda643cf1181bfe15af925cb542d6129c82027ce7337623cabbce20bf9 02203772
- 06: eea96cf55ba1e49ae1a55f34a3b1e5131917e9c405e23e7c9f78a7f0160316b2 02203858
- 07: d216b2b91f055faa48b637aca2cc1e3d4b3e7232c02dad14dbda23dbe498ceb3 02204152
- 08: 95b7379f4b085c54017b0ce00de9727f97889806d91d7bbb3704b72865f820b0 02204421
- 09: 6d2c8027ce357deafde58dc56ae149e2ff8c8ab8febc6c6eb7ed92d15d45d51c 02204470
- 10: aebfa0bf0d9146e7c8e8b34c05d9cf8d6571006f4f6bfe59764bdd2681825be2 02204516
key image 01: a09223e8904584f4785a56d64cd7d46d3e986508c4bb7c2786f44aa2b2c2a146 amount: ?
ring members blk
- 00: e88afe16e11824f39c415d28c0ac1be1550202975d31da04c5b1f8f0275ca1d4 02201782
- 01: 6aa67c75ded15646376662ceeecfd98d5244e0c764d63fd27de2d139cbaea0de 02203293
- 02: feb0fc4c40cb0be580a57ba0174c0d26f4672f0cbdddce50ddb7a0f9839779c8 02203449
- 03: 8480afd5a20f0a2b75e7e850fe388a21dda40bac55d3008018abebef7f447167 02203534
- 04: 49e9e98e7e7b2f1d97c1e79a1fc0729dc5e8db77ed92ce30f43c618f8346f485 02203737
- 05: aa0fd64776cf4711e73ee8d88eb54cb2e7486fa246b62aad10dbe0faf864cec2 02203932
- 06: c6176be5a6caee26c1acf70fe74628ace3b069e576c4ab80c476faac85b951d3 02204382
- 07: 7202c7745cd6eb19aa22c3bed4ca9c53f5ee18c2e5f274ffe274d10f5835bb7e 02204383
- 08: 47edae43e9355e8b4c2c970809f4b2ce1503f732f8ad31ab8e4fb22186b2b801 02204474
- 09: 28ba0f1190e194c55029d18bdda5dd66f1a5c9dd68a889dc4eed929e45661797 02204513
- 10: 8db4fbae543d851af97b4ef02bcd90402a09a0929acc1a6bdd863aaa4da561d0 02204523
More details
source code | moneroexplorer