Monero Transaction ca13030af883b4c1eaca911dd8e2e1eb97e02bb9be1c8c94a438438e12154e89

Autorefresh is OFF

Tx hash: ca13030af883b4c1eaca911dd8e2e1eb97e02bb9be1c8c94a438438e12154e89

Tx public key: b21676e68dcd4f51d7e9504d3da792742f4d15f429c1cd9476b9964d6169ceb1
Payment id: 39737bbd497d304a7277f785a70aa6321b71b380d8f85329db3f6ba9522f3e85

Transaction ca13030af883b4c1eaca911dd8e2e1eb97e02bb9be1c8c94a438438e12154e89 was carried out on the Monero network on 2014-06-03 09:23:05. The transaction has 3173449 confirmations. Total output fee is 0.007238353371 XMR.

Timestamp: 1401787385 Timestamp [UTC]: 2014-06-03 09:23:05 Age [y:d:h:m:s]: 10:112:23:08:11
Block: 68782 Fee (per_kB): 0.007238353371 (0.000532629624) Tx size: 13.5898 kB
Tx version: 1 No of confirmations: 3173449 RingCT/type: no
Extra: 02210039737bbd497d304a7277f785a70aa6321b71b380d8f85329db3f6ba9522f3e8501b21676e68dcd4f51d7e9504d3da792742f4d15f429c1cd9476b9964d6169ceb1

1 output(s) for total of 0.900000000000 xmr

stealth address amount amount idx tag
00: 6a4f407b92f90e688c6ae4c7594c2c05e5b5979d87b587e1be87b91fdb59f112 0.900000000000 10639 of 454894 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



132 inputs(s) for total of 0.168250000000 xmr

Only 10 inputs are shown. To see all, click "more details"
key image 00: 374dcf762d65e95b6db6feeccf9e2252482b0aaa51ea0ee4a3bac4ae8dfa96e2 amount: 0.000250000000
ring members blk
- 00: 3284a3a7862188c9396480c103cc65a5580bbd226b83f13f69083ff64bfbdfec 00067508
key image 01: cf02bfb2ec16a5121a4159653e6fcf2dfdc6c533061525692be9d46c1bb2140f amount: 0.007000000000
ring members blk
- 00: f01616d74d9cf67da77417655f4d2f01c0dff9afc2ea4dd44e17c8c7a3202ac4 00067592
key image 02: 32dfed01686c34d5123691600e0a6dc5dc996a29ea247675e4207240c3bb971e amount: 0.010000000000
ring members blk
- 00: 58c87152273fae589495e66989da44632d76eab4d0517c1ec10b3f27fe6ce484 00068341
key image 03: d2603a3f92d95cc49f8a9eabeeb91d092063933b1819bc3319404c3b45c96f35 amount: 0.010000000000
ring members blk
- 00: b646a2c17cc9e3a5ea03305e32e720ae6affbca8847fdd787178a3904553a7d9 00068505
key image 04: c686cf91bd5051d5de0bad192a1bdd7270149364515836e3f14f063793ca10a1 amount: 0.006000000000
ring members blk
- 00: 166d26bf8319681b99fa38ce1a312b17166f6d1fd46713daf47755dfaf5f3c0f 00067431
key image 05: 976c9bf4bc3ddf150030dcbe227f6e66771f4314cf0466a35f811676a83fa88e amount: 0.010000000000
ring members blk
- 00: bb00d470d0b95ab90c123880c9ac5b10f07ebd0a64e04e6981a1bb208869595f 00068718
key image 06: 3ac091acb9ace0f346ae21ae8e1c595ecd90a666b706c0f8750b773cc1a7ba90 amount: 0.007000000000
ring members blk
- 00: e57146ca67c5ea0961f978efd058425916f35dc829c9f08d9cbce503a01516eb 00067928
key image 07: 6871a2c1c40d939886c18e6fb1c6d038e5994bee45a183192d4f1b477d41c782 amount: 0.010000000000
ring members blk
- 00: 8e9bb8a5930e51f52389b2a514023002539433aae6330ae18e9a3d13114886e7 00067396
key image 08: 066f9050e83b863fa6ee32108a4ed61ef4753347e1f23db28cbc0c998e61fa2a amount: 0.050000000000
ring members blk
- 00: b8cf572ad5d09e627f6bef7bd889b3a7cc8b09564fce0c5e9df8eab7dad680f5 00067327
key image 09: 439dc1822ca12633701ad1403bc8e7b035a1cbbe5c2dba5935f6da6e8ab3d533 amount: 0.008000000000
ring members blk
- 00: 9be5404b292fe02e41ce750a2e06c31e195903d5ca0f7bb20150c3ff5691a063 00068377
key image 10: 222e2a8a014aea5d07250a20871e52481e70363639ffba899714bb8f074e5ee9 amount: 0.050000000000
ring members blk
- 00: 66a444d109f68b59132b33358391085b43de1d4fb1faf6e3e66364311d66558c 00067376
More details
source code | moneroexplorer