Monero Transaction d13a1882eb01b5e72f81f7c9143dd89563783120bd55f6ca67d3ecec5ca0e6a8

Autorefresh is OFF

Tx hash: d13a1882eb01b5e72f81f7c9143dd89563783120bd55f6ca67d3ecec5ca0e6a8

Tx prefix hash: 0c52086f59956a49ea79f991ae6cdf668f38c2f6f938fc07c0d581cc8dff24a0
Tx public key: d2a3a4a57b651e3cf9012b7b5860efaaf556313437afa1edecc745d579693432
Payment id: a4a887e56c389741daca9297a1682dcb76b92c4d83e901d843565f70dca14cc9

Transaction d13a1882eb01b5e72f81f7c9143dd89563783120bd55f6ca67d3ecec5ca0e6a8 was carried out on the Monero network on 2016-12-30 13:48:58. The transaction has 2089773 confirmations. Total output fee is 0.004000000000 XMR.

Timestamp: 1483105738 Timestamp [UTC]: 2016-12-30 13:48:58 Age [y:d:h:m:s]: 07:350:18:02:40
Block: 1212816 Fee (per_kB): 0.004000000000 (0.003237944664) Tx size: 1.2354 kB
Tx version: 1 No of confirmations: 2089773 RingCT/type: no
Extra: 022100a4a887e56c389741daca9297a1682dcb76b92c4d83e901d843565f70dca14cc901d2a3a4a57b651e3cf9012b7b5860efaaf556313437afa1edecc745d579693432

7 output(s) for total of 4.946000000000 xmr

stealth address amount amount idx tag
00: 0bb36ad9dbc87397217d6107454013ad0c9730e88adb83cb7a6a8eff194d190f 0.002000000000 86770 of 95916 -
01: f5f992475f966973f42ac5c16d9f71bb8ef5a60da50c0ba3c59c5e0bf018b655 0.004000000000 79353 of 89181 -
02: 1e520128394a1cae92ddc7bade06d0544210f35d138c8fd90a6ba4e0f3eb5e4f 0.020000000000 371292 of 381492 -
03: 89725ee3816d3a1edb71d5cc8876e9332028d814edcfe1d78489ab76a399d247 0.020000000000 371293 of 381492 -
04: 8c4271ec589b9b44759682b5f3b77404b91c8c61d55703bdd62626cc686a0931 0.300000000000 956678 of 976536 -
05: 7657c71b6e0943b98231a4215dc0a996b7abce733b22fdf7cbf1462f6c997385 0.600000000000 642527 of 650760 -
06: d10c25abce527174138181e993bccffa17b9f02a7ad7202fdecddfc16c4a0ba6 4.000000000000 232426 of 237197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-04 12:38:27 till 2016-12-29 03:32:46; resolution: 5.52 days)

  • |____________*_________*_________________________________________________________*________________________________________________________________________________________*|
  • |__**______*______________________________________________________________________________________________________________________________________________________________*|
  • |_*____________*_____*____________________________________________________________________________________________________________________________________________________*|

3 inputs(s) for total of 4.950000000000 xmr

key image 00: 4cbad878331e6de9749e52f2d08e2f4fe46af5b5cd171f01a391c1a9831468e1 amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e6e3b13a6e509045622428e6bd578d31b7ced3c171f9c20b3fbbb0c39e3f2e68 00159393 1 10/27 2014-08-05 01:30:55 10:134:06:20:43
- 01: 93bc7c67f0c4fbbd1cf7a8c978b1a12b64fee819f03160e5633d9635028f5294 00243715 0 0/4 2014-10-02 20:29:29 10:075:11:22:09
- 02: bf685a5451bf03f41abbd80f5e72e599ae3a79f2923a88d6563199dcf2f077d9 00705583 0 0/5 2015-08-22 01:50:13 09:117:06:01:25
- 03: 4ab1bc7b8e255ba6a2bf09d366a139420851ef02123dfdf5e6f4f10c6fe32387 01211773 3 11/5 2016-12-29 02:32:46 07:352:05:18:52
key image 01: b106c718a6a1c4d2170e55b1776c488b90f7df53656b424674a5a85a21ae250f amount: 0.050000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 616cb43d7d3616d8f83311b183a6df90fb80c1d209cd552327bd1e21e5ffb824 00082968 1 8/140 2014-06-13 04:51:10 10:187:03:00:28
- 01: f4201183488c6e083f17303e02acdfd5dccd5fb81e9af914cefac98655fb48f3 00092027 1 32/4 2014-06-19 09:43:18 10:180:22:08:20
- 02: b49325a1298262a4f825777141575a95443bd1bb57fddd4ae64ec20fdeacc93d 00148095 2 3/5 2014-07-28 05:00:37 10:142:02:51:01
- 03: 0bee86cc0111619bb2937443e0e36574e5bbdd50e727415fd816040da0e6b206 01211773 3 11/5 2016-12-29 02:32:46 07:352:05:18:52
key image 02: ff17023d4b56faf9b3ec247b7a5b0da32ff4eb879d326ddddf3b0e2829105746 amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0141ef7cada1f877d10009593442b3b4c88b100245b432e00b887d6515854618 00070484 1 80/61 2014-06-04 13:38:27 10:195:18:13:11
- 01: 754157296d112e22435ef18b1c509c1849e685c95360877cd43005c4bae61a77 00180254 0 0/6 2014-08-19 14:31:38 10:119:17:20:00
- 02: 52309a0c0d56f243c61f434112891215215dbbe5dabf5a02aaaeddbcd6ff86d7 00223797 0 0/4 2014-09-18 23:02:42 10:089:08:48:56
- 03: 3dd13d41373e4d4324574501c7f0b208623c49aca67ba9c475b96b4c041cee1e 01211773 3 11/5 2016-12-29 02:32:46 07:352:05:18:52
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 900000000000, "key_offsets": [ 76316, 57092, 142936, 165328 ], "k_image": "4cbad878331e6de9749e52f2d08e2f4fe46af5b5cd171f01a391c1a9831468e1" } }, { "key": { "amount": 50000000000, "key_offsets": [ 57441, 28797, 24128, 163401 ], "k_image": "b106c718a6a1c4d2170e55b1776c488b90f7df53656b424674a5a85a21ae250f" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 3795, 44670, 50423, 133006 ], "k_image": "ff17023d4b56faf9b3ec247b7a5b0da32ff4eb879d326ddddf3b0e2829105746" } } ], "vout": [ { "amount": 2000000000, "target": { "key": "0bb36ad9dbc87397217d6107454013ad0c9730e88adb83cb7a6a8eff194d190f" } }, { "amount": 4000000000, "target": { "key": "f5f992475f966973f42ac5c16d9f71bb8ef5a60da50c0ba3c59c5e0bf018b655" } }, { "amount": 20000000000, "target": { "key": "1e520128394a1cae92ddc7bade06d0544210f35d138c8fd90a6ba4e0f3eb5e4f" } }, { "amount": 20000000000, "target": { "key": "89725ee3816d3a1edb71d5cc8876e9332028d814edcfe1d78489ab76a399d247" } }, { "amount": 300000000000, "target": { "key": "8c4271ec589b9b44759682b5f3b77404b91c8c61d55703bdd62626cc686a0931" } }, { "amount": 600000000000, "target": { "key": "7657c71b6e0943b98231a4215dc0a996b7abce733b22fdf7cbf1462f6c997385" } }, { "amount": 4000000000000, "target": { "key": "d10c25abce527174138181e993bccffa17b9f02a7ad7202fdecddfc16c4a0ba6" } } ], "extra": [ 2, 33, 0, 164, 168, 135, 229, 108, 56, 151, 65, 218, 202, 146, 151, 161, 104, 45, 203, 118, 185, 44, 77, 131, 233, 1, 216, 67, 86, 95, 112, 220, 161, 76, 201, 1, 210, 163, 164, 165, 123, 101, 30, 60, 249, 1, 43, 123, 88, 96, 239, 170, 245, 86, 49, 52, 55, 175, 161, 237, 236, 199, 69, 213, 121, 105, 52, 50 ], "signatures": [ "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", "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", "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"] }


Less details
source code | moneroexplorer