Monero Transaction 20910d2c69779f0f245774c2e6c5b99e0092bc877a6ed21839ffaefbfc7a7ecc

Autorefresh is OFF

Tx hash: 20910d2c69779f0f245774c2e6c5b99e0092bc877a6ed21839ffaefbfc7a7ecc

Tx prefix hash: 840e2f29f98a71b31b1086d9bef03ec2960c35672c02be52170d867c6bff8e07
Tx public key: 2c9fe32ff3580cde9258265a44d9c2fa18d101ea2f520ee3d0b51b9ab533b9ad

Transaction 20910d2c69779f0f245774c2e6c5b99e0092bc877a6ed21839ffaefbfc7a7ecc was carried out on the Monero network on 2014-06-05 02:48:40. The transaction has 3206987 confirmations. Total output fee is 0.005229098292 XMR.

Timestamp: 1401936520 Timestamp [UTC]: 2014-06-05 02:48:40 Age [y:d:h:m:s]: 10:161:10:26:35
Block: 71362 Fee (per_kB): 0.005229098292 (0.006002911044) Tx size: 0.8711 kB
Tx version: 1 No of confirmations: 3206987 RingCT/type: no
Extra: 012c9fe32ff3580cde9258265a44d9c2fa18d101ea2f520ee3d0b51b9ab533b9ad

11 output(s) for total of 21.997498325031 xmr

stealth address amount amount idx tag
00: 4aabbae9977513620012d4d5382e7072f48542f2e7ffcd0c7cc460f990731fa4 0.000040635764 0 of 1 -
01: 50dda19e2939d881c835238036c3d0c5f686390c54a55fff252147d7fc5d4ed6 0.000457689267 0 of 1 -
02: 860782644ae46cb79b98f91eea60699ce3a7cf21acc8b6f8f1883163d2de0dfd 0.008000000000 41900 of 245068 -
03: 3043bd19120e81cb95e6939bcbaa9688d21dfe6ac753d396f0400ecc868e4950 0.009000000000 40945 of 233398 -
04: 5811516796dadd52ec72b3427c89862d32171e049f678fdff88509a408d603c4 0.030000000000 39148 of 324336 -
05: 3abe1edd0972ad9173da628c430a402ea84e9ad2ebb44854f299725e77bf997d 0.050000000000 27530 of 284521 -
06: 5b6a03af766a329cda050bd8577ecd7f7c10afbabacc0e0286177a7b6832a3d4 0.200000000000 20557 of 1272210 -
07: 4855f979746e6b976208c7f9b3c6b7290334cdbe1f5933924b6a19ac26797309 0.700000000000 11132 of 514466 -
08: 89500c89d46b270aee2ca5461997c7f97355749f501911ec983274c5f0a6dcf9 5.000000000000 4598 of 255089 -
09: f051b25b610d41749bcd0eded3fab38c64bb783cc39bd538f815ff7900db8d15 6.000000000000 35064 of 207703 -
10: a09aa0c3d499be94b5ef75362d000decce5e54cda58e0c404abad6dd37042cbe 10.000000000000 72753 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-04 23:22:49 till 2014-06-05 02:47:04; resolution: 0.00 days)

  • |__________________________________________________*_______________________________________________________________________________________________________________________|
  • |________________________________________________________________________________________________________________________*_________________________________________________|
  • |________________________________________________________________________________________________________________*_________________________________________________________|
  • |________________________________________________________________________________________________________________________*_________________________________________________|

4 inputs(s) for total of 22.002727423323 xmr

key image 00: 494cda58017ca613bda48f36fc728129af0ef1df90b327f4f7aff353a7599389 amount: 0.002727423323
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9f876493d611b1173f83df5646383b5aa1d7148b12547b32b359be9da6b34647 00071212 0 0/5 2014-06-05 00:22:49 10:161:12:52:26
key image 01: 90b9cd361764a61fd63d84392fbfdb1982240f6bfb701ca47ff9b64a6f0a057e amount: 6.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a18aa68222b6ac0d2fb1195f8ee955e1ca23ae3ba696e1eb889f68ceae6a3bb3 00071301 0 0/5 2014-06-05 01:47:04 10:161:11:28:11
key image 02: 8f950f9e5830564091d3d00b3ee7b1786650ab877960935bc2dfa1f2cda32315 amount: 6.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 72877ff97e4b90c59e9ea49e589a7e5aca1e14f95160056281fae11be1f56adc 00071294 0 0/6 2014-06-05 01:37:11 10:161:11:38:04
key image 03: 24488decce9a3a0de2cc047d3dbac79e7994dc75cf797d25fb6332785f3b9b69 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1f68de1d25be54645c62c0943c3641a9f917475cd9ce22849c7d9db4cbe7c6bf 00071301 0 0/5 2014-06-05 01:47:04 10:161:11:28:11
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 2727423323, "key_offsets": [ 0 ], "k_image": "494cda58017ca613bda48f36fc728129af0ef1df90b327f4f7aff353a7599389" } }, { "key": { "amount": 6000000000000, "key_offsets": [ 34997 ], "k_image": "90b9cd361764a61fd63d84392fbfdb1982240f6bfb701ca47ff9b64a6f0a057e" } }, { "key": { "amount": 6000000000000, "key_offsets": [ 34986 ], "k_image": "8f950f9e5830564091d3d00b3ee7b1786650ab877960935bc2dfa1f2cda32315" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 72664 ], "k_image": "24488decce9a3a0de2cc047d3dbac79e7994dc75cf797d25fb6332785f3b9b69" } } ], "vout": [ { "amount": 40635764, "target": { "key": "4aabbae9977513620012d4d5382e7072f48542f2e7ffcd0c7cc460f990731fa4" } }, { "amount": 457689267, "target": { "key": "50dda19e2939d881c835238036c3d0c5f686390c54a55fff252147d7fc5d4ed6" } }, { "amount": 8000000000, "target": { "key": "860782644ae46cb79b98f91eea60699ce3a7cf21acc8b6f8f1883163d2de0dfd" } }, { "amount": 9000000000, "target": { "key": "3043bd19120e81cb95e6939bcbaa9688d21dfe6ac753d396f0400ecc868e4950" } }, { "amount": 30000000000, "target": { "key": "5811516796dadd52ec72b3427c89862d32171e049f678fdff88509a408d603c4" } }, { "amount": 50000000000, "target": { "key": "3abe1edd0972ad9173da628c430a402ea84e9ad2ebb44854f299725e77bf997d" } }, { "amount": 200000000000, "target": { "key": "5b6a03af766a329cda050bd8577ecd7f7c10afbabacc0e0286177a7b6832a3d4" } }, { "amount": 700000000000, "target": { "key": "4855f979746e6b976208c7f9b3c6b7290334cdbe1f5933924b6a19ac26797309" } }, { "amount": 5000000000000, "target": { "key": "89500c89d46b270aee2ca5461997c7f97355749f501911ec983274c5f0a6dcf9" } }, { "amount": 6000000000000, "target": { "key": "f051b25b610d41749bcd0eded3fab38c64bb783cc39bd538f815ff7900db8d15" } }, { "amount": 10000000000000, "target": { "key": "a09aa0c3d499be94b5ef75362d000decce5e54cda58e0c404abad6dd37042cbe" } } ], "extra": [ 1, 44, 159, 227, 47, 243, 88, 12, 222, 146, 88, 38, 90, 68, 217, 194, 250, 24, 209, 1, 234, 47, 82, 14, 227, 208, 181, 27, 154, 181, 51, 185, 173 ], "signatures": [ "c91185696aec6fcdc783ec40842a28845bbadc94fa310399ce51ebc0583619042ac3ad6aea5feb0bc2220f94f9d2de85508f56ac85e8b91c87665ab83b027c08", "82451a62117ac38c2dfc25673fc90587265126370388765076520a76331c3c070ec9181b5ed341923973affe91b216aaec4bdea3eda8566ae6bb02ae0d06980e", "a8a8932a39c3031e7e63c2326b9c24691cf02b77ee1bd84b38d93755090ab10b6764da31929feedbe268cb344d5d5a3e4ea82343634d50b5baec4d16393a3706", "bfcd49235faf6fd304e72d1bef8586ce0ef27cb5911720430d7d10bb742195088db112ae707218717448a121a4e229b542efd540a302116785e2bdbe6c81ca03"] }


Less details
source code | moneroexplorer