Monero Transaction 20315e6b409542d910b65bedf97bc8e0fc945bba118bb0cdf515ab448ee69cb4

Autorefresh is OFF

Tx hash: 20315e6b409542d910b65bedf97bc8e0fc945bba118bb0cdf515ab448ee69cb4

Tx prefix hash: bd3210c709a08d328060f6b169ed566dff039e1faa554436c7ebdaa05b4ffba4
Tx public key: 4252e2df98e8031caf6e9c5fbdab5b7002b43a4012cbf55036a4fcb1be7eda98
Payment id: ba0bb161b9d55dd1fd3ab2ccddbffab89220149d40c0429c4ee0b0d456ef32bd

Transaction 20315e6b409542d910b65bedf97bc8e0fc945bba118bb0cdf515ab448ee69cb4 was carried out on the Monero network on 2014-07-25 17:19:25. The transaction has 3096829 confirmations. Total output fee is 0.005973138548 XMR.

Timestamp: 1406308765 Timestamp [UTC]: 2014-07-25 17:19:25 Age [y:d:h:m:s]: 10:059:11:17:40
Block: 144569 Fee (per_kB): 0.005973138548 (0.007560561030) Tx size: 0.7900 kB
Tx version: 1 No of confirmations: 3096829 RingCT/type: no
Extra: 022100ba0bb161b9d55dd1fd3ab2ccddbffab89220149d40c0429c4ee0b0d456ef32bd014252e2df98e8031caf6e9c5fbdab5b7002b43a4012cbf55036a4fcb1be7eda98

8 output(s) for total of 7.234026861452 xmr

stealth address amount amount idx tag
00: 0dfa4a0e3fef91aa73663b5d16a7406a810aae9ec99ea5458ca8f9cfbdd121f2 0.000026861452 0 of 1 -
01: 4afa26743ff1db5a412977ec79e6b82d636b03c025b83ddfe03b8c6b0166f263 0.005000000000 194976 of 308584 -
02: 810d82002dfe8a6f7bb11c8e6fc9cfa191d317b74bf2f83d7a8090b38a8beff0 0.009000000000 152607 of 233397 -
03: fdcfb8e15e1ca5951adac7b9ce381804b0fe75875d858e8dd474c8796e2f1eb8 0.020000000000 203406 of 381490 -
04: 5d1ae7e176c136533a9dffeb2ac60c3878cfa7cba1332562af7f9948c2cfb05b 0.400000000000 113508 of 688584 -
05: 12102b8e019477a47c20d93c569c510c837451aa7b2b6648218882b03378f280 0.800000000000 83155 of 489955 -
06: 19f5ecd003a3142441fe283d5eb152c180dae00a07779d6d9f4207e2d77cca78 2.000000000000 53639 of 434057 -
07: d445af8427c02d13c66e9250071ba2d86b51b52e380d911b40a174aa71017e4d 4.000000000000 27757 of 237197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-24 21:51:38 till 2014-07-25 16:04:53; resolution: 0.00 days)

  • |__________*_______________________________________________________________________________________________________________________________________________________________|
  • |___________________________________________________________*______________________________________________________________________________________________________________|
  • |_____________________________________________________________________________________________________*____________________________________________________________________|
  • |________________________________________________________________________________________________________________________________________________________________*_________|

4 inputs(s) for total of 7.240000000000 xmr

key image 00: cfcf585ceb6d7e8bbd9f7767575c58643c01e95da1f9ba595897083edee3650d amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 89aae0481f7bce3bbed143ff63725ca32a6dedc6a6a0eae3ef8deaafe8dcb5f3 00143407 1 1/4 2014-07-24 22:51:38 10:060:05:45:27
key image 01: 211d09a1c8efba44aa0400380270352f666c4ca7f8f833937638c867229a280d amount: 0.070000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7f84f4344c19b246fdcb48e440aa0751a4d4bd8001b0f4313130e0d066b698b4 00143722 1 2/6 2014-07-25 04:08:40 10:060:00:28:25
key image 02: f90c145a8f95600282ed0c1917f127726c20bb71f9f84e7468b8264f646fb77f amount: 0.080000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3bcc152b856f1e0aa0a02b673a4d17b88f56c52ed8937f7f5fa889025d1b36b9 00144025 1 1/7 2014-07-25 08:39:52 10:059:19:57:13
key image 03: 8fd92e7b59854337363ec5ca9813d3865790cc80a29d2527ac61f0c260a1d922 amount: 7.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 2e77ca5da2a5111e6c301284546e1213b3d6207c4972f753a5f1bbfcaba37421 00144432 1 1/6 2014-07-25 15:04:53 10:059:13:32:12
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 90000000000, "key_offsets": [ 88921 ], "k_image": "cfcf585ceb6d7e8bbd9f7767575c58643c01e95da1f9ba595897083edee3650d" } }, { "key": { "amount": 70000000000, "key_offsets": [ 86805 ], "k_image": "211d09a1c8efba44aa0400380270352f666c4ca7f8f833937638c867229a280d" } }, { "key": { "amount": 80000000000, "key_offsets": [ 82251 ], "k_image": "f90c145a8f95600282ed0c1917f127726c20bb71f9f84e7468b8264f646fb77f" } }, { "key": { "amount": 7000000000000, "key_offsets": [ 46532 ], "k_image": "8fd92e7b59854337363ec5ca9813d3865790cc80a29d2527ac61f0c260a1d922" } } ], "vout": [ { "amount": 26861452, "target": { "key": "0dfa4a0e3fef91aa73663b5d16a7406a810aae9ec99ea5458ca8f9cfbdd121f2" } }, { "amount": 5000000000, "target": { "key": "4afa26743ff1db5a412977ec79e6b82d636b03c025b83ddfe03b8c6b0166f263" } }, { "amount": 9000000000, "target": { "key": "810d82002dfe8a6f7bb11c8e6fc9cfa191d317b74bf2f83d7a8090b38a8beff0" } }, { "amount": 20000000000, "target": { "key": "fdcfb8e15e1ca5951adac7b9ce381804b0fe75875d858e8dd474c8796e2f1eb8" } }, { "amount": 400000000000, "target": { "key": "5d1ae7e176c136533a9dffeb2ac60c3878cfa7cba1332562af7f9948c2cfb05b" } }, { "amount": 800000000000, "target": { "key": "12102b8e019477a47c20d93c569c510c837451aa7b2b6648218882b03378f280" } }, { "amount": 2000000000000, "target": { "key": "19f5ecd003a3142441fe283d5eb152c180dae00a07779d6d9f4207e2d77cca78" } }, { "amount": 4000000000000, "target": { "key": "d445af8427c02d13c66e9250071ba2d86b51b52e380d911b40a174aa71017e4d" } } ], "extra": [ 2, 33, 0, 186, 11, 177, 97, 185, 213, 93, 209, 253, 58, 178, 204, 221, 191, 250, 184, 146, 32, 20, 157, 64, 192, 66, 156, 78, 224, 176, 212, 86, 239, 50, 189, 1, 66, 82, 226, 223, 152, 232, 3, 28, 175, 110, 156, 95, 189, 171, 91, 112, 2, 180, 58, 64, 18, 203, 245, 80, 54, 164, 252, 177, 190, 126, 218, 152 ], "signatures": [ "f8493ea4a7b176939f6cebde677b63cdf6f22304267b2ed381729267bcd32c082f244b2367d3b4e07cd0ab4e49e126d2fa8c2d22dc2db2b6851d1048636cf706", "3477320ddbb26aa7ef512a854ce2348d5bba76c34edc5269a3a32e167649bb060780709a7d691fae1612c09b79ca631d53e4a6e5c55b254e7b97441bf0d8d80e", "bea0aab317fb047d016ae5ed8c91a915bcc4023f0cd97b25a16dacf24479d5048707c93040ff37318af3a047e60ea5401e34c949238691002f550fd35a335f02", "dcd298d3fc84dd637a789231202cd8c433a7d5f6e6b76fe0e024e103c094d10861006d1c6ea0e17e6da365bd8842dcad21909c112b2e37a00dd76210d2bcdd08"] }


Less details
source code | moneroexplorer