Monero Transaction d13928c7c20a693df2c8d131f305a69723c2143f9a6c229534bb597ad9ad1338

Autorefresh is OFF

Tx hash: d13928c7c20a693df2c8d131f305a69723c2143f9a6c229534bb597ad9ad1338

Tx prefix hash: 4f0ceed6db6284300b6cad607fc98b63737b25ffdd366b9549f49e8323af0f33
Tx public key: 417b9f5387a0a250bad3b583c5832d1a6d87ee8f095fd67877649eca88807388

Transaction d13928c7c20a693df2c8d131f305a69723c2143f9a6c229534bb597ad9ad1338 was carried out on the Monero network on 2016-03-23 13:52:57. The transaction has 2292114 confirmations. Total output fee is 0.014994660000 XMR.

Timestamp: 1458741177 Timestamp [UTC]: 2016-03-23 13:52:57 Age [y:d:h:m:s]: 08:266:14:12:16
Block: 1009699 Fee (per_kB): 0.014994660000 (0.018128136765) Tx size: 0.8271 kB
Tx version: 1 No of confirmations: 2292114 RingCT/type: no
Extra: 01417b9f5387a0a250bad3b583c5832d1a6d87ee8f095fd67877649eca88807388

10 output(s) for total of 8.415005340000 xmr

stealth address amount amount idx tag
00: 1d7826aebf2fb4d49034ce42e5ad273470ccff1cc5db1488d605b5e80eed0fa0 0.000000040000 1010 of 22715 -
01: b20c28539089bb06bb5c3b7b84e622a24942d8edd7830b23c30419ced6e5c6bb 0.000000300000 1103 of 22748 -
02: 427c31bf9af1607f0bc1b18b049f4ad88443c0e3e92bb635ebf26e121683b08b 0.000005000000 19998 of 42488 -
03: 2b4721342d5ecc663379f1b07439f9b5568eed711386e571da70ffe480978ace 0.005000000000 249878 of 308585 -
04: bbcd0a6c15f2001eb4577eed4fc5881f669d7caf572fc718ed6ab8aeddd97c8f 0.030000000000 259286 of 324336 -
05: 809b312e83a49d63236f07e5ff9be6e2f059b1c9cf31ff7b796f2dcaf1d639ec 0.080000000000 196338 of 269576 -
06: 913057f59839ddbeea6dbcd43cb8a8b7fc19d59627919b5531e85d8bf94dd5c3 0.600000000000 557446 of 650760 -
07: 5e6e0eb159ae9d619ed5aab839c1404c0b233c32efbb3946edd602c94b6149b1 0.700000000000 428974 of 514467 -
08: ba92cf71bced9fa59445c2a7a61a778e2bc77e688f70d5311d766a218bab3f31 1.000000000000 693578 of 874630 -
09: 5ba62187a02d63229d1ddc79558d84cf59d652a6b14ef7942bac1927ea511bf1 6.000000000000 171587 of 207703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2016-03-04 13:32:12 till 2016-03-19 01:48:51; resolution: 0.09 days)

  • |____________________________________________________________________________*_____________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_______________________________________________________________________________________________________________*__________________________________________________________|
  • |_*________________________________________________________________________________________________________________________________________________________________________|

4 inputs(s) for total of 8.430000000000 xmr

key image 00: 0c5299e7ed017731498138df8401d4a1b4d583cc02ce8273cc69d3d3eae10c3a amount: 0.030000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 2d64fec9f60a0a26bf58f13e16078d0e54654475905affb916053887bcf2e117 00991971 1 6/12 2016-03-11 02:03:49 08:279:02:01:24
key image 01: 1ffe2595ce046063d1b446c7357902162aca5060a92b4f3b9ea7e03f3e34210b amount: 0.400000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 89e24b5f831b7dc8dd6c96de7edae64cbf9ab70e8aec63511d53c452e1ab3fb3 01003270 1 6/10 2016-03-19 00:48:51 08:271:03:16:22
key image 02: 3167b670d2a246fc95ea9e929b7a4a95d5a5b59e84f960695f2b5f4a97721b00 amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 2a50a3bfa1cdb40b5049d11afa23ad3f2908ff246bf09cd121d1c892711850f3 00996186 1 7/9 2016-03-14 01:58:15 08:276:02:06:58
key image 03: 2171b6f918a8ea79e3cdb294627c3b514b350ff745f4bba452f80e69f90de73c amount: 7.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: de7d2ecbbd585164e6e2a44f32e2befd3b79d8d48fe890e337673279541a8abb 00982861 0 0/4 2016-03-04 14:32:12 08:285:13:33:01
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 30000000000, "key_offsets": [ 255935 ], "k_image": "0c5299e7ed017731498138df8401d4a1b4d583cc02ce8273cc69d3d3eae10c3a" } }, { "key": { "amount": 400000000000, "key_offsets": [ 564919 ], "k_image": "1ffe2595ce046063d1b446c7357902162aca5060a92b4f3b9ea7e03f3e34210b" } }, { "key": { "amount": 1000000000000, "key_offsets": [ 690472 ], "k_image": "3167b670d2a246fc95ea9e929b7a4a95d5a5b59e84f960695f2b5f4a97721b00" } }, { "key": { "amount": 7000000000000, "key_offsets": [ 247082 ], "k_image": "2171b6f918a8ea79e3cdb294627c3b514b350ff745f4bba452f80e69f90de73c" } } ], "vout": [ { "amount": 40000, "target": { "key": "1d7826aebf2fb4d49034ce42e5ad273470ccff1cc5db1488d605b5e80eed0fa0" } }, { "amount": 300000, "target": { "key": "b20c28539089bb06bb5c3b7b84e622a24942d8edd7830b23c30419ced6e5c6bb" } }, { "amount": 5000000, "target": { "key": "427c31bf9af1607f0bc1b18b049f4ad88443c0e3e92bb635ebf26e121683b08b" } }, { "amount": 5000000000, "target": { "key": "2b4721342d5ecc663379f1b07439f9b5568eed711386e571da70ffe480978ace" } }, { "amount": 30000000000, "target": { "key": "bbcd0a6c15f2001eb4577eed4fc5881f669d7caf572fc718ed6ab8aeddd97c8f" } }, { "amount": 80000000000, "target": { "key": "809b312e83a49d63236f07e5ff9be6e2f059b1c9cf31ff7b796f2dcaf1d639ec" } }, { "amount": 600000000000, "target": { "key": "913057f59839ddbeea6dbcd43cb8a8b7fc19d59627919b5531e85d8bf94dd5c3" } }, { "amount": 700000000000, "target": { "key": "5e6e0eb159ae9d619ed5aab839c1404c0b233c32efbb3946edd602c94b6149b1" } }, { "amount": 1000000000000, "target": { "key": "ba92cf71bced9fa59445c2a7a61a778e2bc77e688f70d5311d766a218bab3f31" } }, { "amount": 6000000000000, "target": { "key": "5ba62187a02d63229d1ddc79558d84cf59d652a6b14ef7942bac1927ea511bf1" } } ], "extra": [ 1, 65, 123, 159, 83, 135, 160, 162, 80, 186, 211, 181, 131, 197, 131, 45, 26, 109, 135, 238, 143, 9, 95, 214, 120, 119, 100, 158, 202, 136, 128, 115, 136 ], "signatures": [ "dd55130b27706a8b995879b5344e11518257628c7321f15697c01f684ba954074f5e6e1b3c0bff674658fc7818dd97161356f3e20f34d25aac2fe591659ac000", "f0a179d09d4bf9940a91061774e240225d15e64f1b9879ad672c2e0737f5d10a3372e384d89589507cd5484fb1ac27a7ccc37f9258a306cc90d6f664307c5008", "86b7584fd9a5b54647b050669bde806e01cd85bedc66315c0c18bd3dc3289a0c5540fdec0c0f0dcada99b835c26b989fd89e7b5fffba64fba19f5dabcfe49c0d", "dce2554f30876dd1d939e5fc94c0dbac3aeaa28a87bedee22be3c19dc5b8000c0a2eecc8756cec4a0d774791849efe86b0990172ee757db9f642c9f6cd8d6b0d"] }


Less details
source code | moneroexplorer