Monero Transaction 020d44954ce9dbb9ef88f100cc08851d74b0d1e51422a5b47f8c5c0ec4144a55

Autorefresh is OFF

Tx hash: 020d44954ce9dbb9ef88f100cc08851d74b0d1e51422a5b47f8c5c0ec4144a55

Tx prefix hash: c16dab9bcee932603e6e00aaeadebb8cdc15a1469893c54261fb1f15b0aa56fa
Tx public key: 1907cd4bc9dac48d6f3aa3c07dc32e02755fc9965880201b7d8d09f4d3c551bf
Payment id: a5250b985a5e530e0d087df6dba5840ecec4257c0c4d40d58bbcfd108f9ab8f5

Transaction 020d44954ce9dbb9ef88f100cc08851d74b0d1e51422a5b47f8c5c0ec4144a55 was carried out on the Monero network on 2014-10-02 01:15:53. The transaction has 3050362 confirmations. Total output fee is 0.103870633094 XMR.

Timestamp: 1412212553 Timestamp [UTC]: 2014-10-02 01:15:53 Age [y:d:h:m:s]: 10:062:17:39:38
Block: 242570 Fee (per_kB): 0.103870633094 (0.162387066089) Tx size: 0.6396 kB
Tx version: 1 No of confirmations: 3050362 RingCT/type: no
Extra: 022100a5250b985a5e530e0d087df6dba5840ecec4257c0c4d40d58bbcfd108f9ab8f5011907cd4bc9dac48d6f3aa3c07dc32e02755fc9965880201b7d8d09f4d3c551bf

4 output(s) for total of 11.724726150000 xmr

stealth address amount amount idx tag
00: 7249b33a5fef4bfc8d82217296b997eff02537b73ea7bbf7ac8d22e1a03e46ae 0.024726150000 0 of 1 -
01: bdbec30274aeb68661ddfb17e88bf65c092de22ba61bda045c1b7f41cdf646ce 0.700000000000 163577 of 514467 -
02: 228c32c64f2788ed9f536e8c245cc5fe3602e68a4aa8ffe7f59f9322d5c39019 1.000000000000 286422 of 874629 -
03: 98d4123138de5799450ee7a4a97ef9ec57691a36ab475f19ed25f27584988313 10.000000000000 282427 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-09-14 13:28:48 till 2014-10-02 00:20:46; resolution: 0.10 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |________________________________________________________________________________________________________________________________________________________________________*_|
  • |________________________________________________________________________________________________________________________________________________________________________*_|
  • |_________________________________________________________________________________________________________________________________________________________________________*|

4 inputs(s) for total of 11.828596783094 xmr

key image 00: 07d581192e9ede6b2da72ca6be48846027e3a11648fe8037834885cbe4270dac amount: 0.028596783094
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: af6aa8f5a4ae15eb65f103b72f40e76a8462210c478b4b0c8710f241eb1ae800 00217642 0 0/4 2014-09-14 14:28:48 10:080:04:26:43
key image 01: 1234c796077764125de96b53e8d54e7e71c6006588877a6dc48271b811a6e0cd amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: fee9aa3f20785bd7c1881214c848b1ec905ab15e88663f9344f9517b718c6873 00242371 0 0/4 2014-10-01 21:26:07 10:062:21:29:24
key image 02: 8cc8534dd5fc19c301bd886ee6aed6e4fc8198d014192614a98b39da3b76c27a amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: bd738dd4ba7d9d6f2600ef96c2e7993294249772eb57db6d0272ef8602c7ad06 00242322 0 0/4 2014-10-01 20:34:46 10:062:22:20:45
key image 03: 62907526e08a0ec2adaadff50900f4447c756a9c05489763f3c7df54520d03ed amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8efa6db8406842d15b54b964f80b01ba718a84394ffd0d6e110ce824415a72de 00242481 0 0/4 2014-10-01 23:20:46 10:062:19:34:45
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 28596783094, "key_offsets": [ 0 ], "k_image": "07d581192e9ede6b2da72ca6be48846027e3a11648fe8037834885cbe4270dac" } }, { "key": { "amount": 900000000000, "key_offsets": [ 131938 ], "k_image": "1234c796077764125de96b53e8d54e7e71c6006588877a6dc48271b811a6e0cd" } }, { "key": { "amount": 900000000000, "key_offsets": [ 131898 ], "k_image": "8cc8534dd5fc19c301bd886ee6aed6e4fc8198d014192614a98b39da3b76c27a" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 282318 ], "k_image": "62907526e08a0ec2adaadff50900f4447c756a9c05489763f3c7df54520d03ed" } } ], "vout": [ { "amount": 24726150000, "target": { "key": "7249b33a5fef4bfc8d82217296b997eff02537b73ea7bbf7ac8d22e1a03e46ae" } }, { "amount": 700000000000, "target": { "key": "bdbec30274aeb68661ddfb17e88bf65c092de22ba61bda045c1b7f41cdf646ce" } }, { "amount": 1000000000000, "target": { "key": "228c32c64f2788ed9f536e8c245cc5fe3602e68a4aa8ffe7f59f9322d5c39019" } }, { "amount": 10000000000000, "target": { "key": "98d4123138de5799450ee7a4a97ef9ec57691a36ab475f19ed25f27584988313" } } ], "extra": [ 2, 33, 0, 165, 37, 11, 152, 90, 94, 83, 14, 13, 8, 125, 246, 219, 165, 132, 14, 206, 196, 37, 124, 12, 77, 64, 213, 139, 188, 253, 16, 143, 154, 184, 245, 1, 25, 7, 205, 75, 201, 218, 196, 141, 111, 58, 163, 192, 125, 195, 46, 2, 117, 95, 201, 150, 88, 128, 32, 27, 125, 141, 9, 244, 211, 197, 81, 191 ], "signatures": [ "13a9bad8bc6c7cf9d9cecc779297ff26ac757be9e8d5b1297e55155fe00d7e07c1a171f89c4bb5a74929af9c0b4481060654740adb71f929b3cd241f729a8e0c", "07f7b963f57f5a7d3fc045b1323e2b164db9a5cd89c1936c0c02c2811f27c607ffae3344516cd276d81bb3ba68e3eba2a66e1e8f3824c9dd0f7dce12cd44a609", "c3e804b4273e07592c8fde53e655ed8ca3e8d0916d7601c67b31dcbb8b48f408c53527e984a378f59c89d43a57611e843e52e6ed6a507e4d773464e3465f810e", "b5adfe5df314b7791c3a473521b1edcc9194c6e02a3d8fe5c0aa55388a27ef01ec5a1601d584b587516cd7a2b4a1f76483562c8dae45801ebbb032248f75f606"] }


Less details
source code | moneroexplorer