Monero Transaction 20ad406a4840b844e323b32f27f40867d9fc855a71cc07f22d9e69957bd291ac

Autorefresh is OFF

Tx hash: 20ad406a4840b844e323b32f27f40867d9fc855a71cc07f22d9e69957bd291ac

Tx prefix hash: 992bd6a22c8a322e213ad4450a8585d0ffee4845b2d1d14d75358f3ac91a3405
Tx public key: 3754ad9b29b4708cc5290fd298b92ec1e2b307799c312ff9b962b3afb15b3b48
Payment id: 2d5966f7babcc41e39bb03edc7cd04e313c8ac056b230313cdfd0dbd57a5b89d

Transaction 20ad406a4840b844e323b32f27f40867d9fc855a71cc07f22d9e69957bd291ac was carried out on the Monero network on 2014-07-18 12:31:20. The transaction has 3144008 confirmations. Total output fee is 0.005100000000 XMR.

Timestamp: 1405686680 Timestamp [UTC]: 2014-07-18 12:31:20 Age [y:d:h:m:s]: 10:117:18:35:03
Block: 134157 Fee (per_kB): 0.005100000000 (0.005861279461) Tx size: 0.8701 kB
Tx version: 1 No of confirmations: 3144008 RingCT/type: no
Extra: 0221002d5966f7babcc41e39bb03edc7cd04e313c8ac056b230313cdfd0dbd57a5b89d013754ad9b29b4708cc5290fd298b92ec1e2b307799c312ff9b962b3afb15b3b48

10 output(s) for total of 160.084900000000 xmr

stealth address amount amount idx tag
00: 489a79d9fddf9a2615c7da6e45b361fdda6107d44f608023abf6efbb0c9102d3 0.000900000000 35897 of 81915 -
01: 0d3ce0719f1beaaaa6200d0903b545c6c3f19c28eda3b5ed3a3fc7988e605c2b 0.006000000000 171450 of 256624 -
02: f6d3520aee82a23f6e95e78906dc521167ee89a136e49a0f854e97ec70f67e9e 0.008000000000 155578 of 245068 -
03: 445808f1ab4b9ea961bd9ccf4bde657eadb2701e9e2b7826d3c0db442aebdec4 0.070000000000 84098 of 263947 -
04: 623139ad948510cc33151353a74b1d96bea3076312c904dd56278256aec04f32 0.200000000000 216115 of 1272210 -
05: d0a8384349ef867143101b0ccb6fb785a445dabc9e7785ed0551c6f2cfa07a15 0.800000000000 71509 of 489955 -
06: 43e6de550adfac6d2f6c7bfe268134d5a8561bc33423601c5e67e817e14ee06d 1.000000000000 113367 of 874629 -
07: dbbfa45366a333dd2e1cbed590891867210b83e3daca144cdbba60abb39b19af 8.000000000000 9590 of 226902 -
08: 3b1e4a6675f44f68cdfe0396877eff249a3910bca25b4667fd350dbbcdc9009a 50.000000000000 2897 of 44703 -
09: bc1e472891fa0ce91d5870cd2e2380a95e3b4bd109313fe7f51045a9121d8b5f 100.000000000000 3613 of 57197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-02 00:59:03 till 2014-07-17 08:57:54; resolution: 0.09 days)

  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |____________________________*_____________________________________________________________________________________________________________________________________________|
  • |___________________________________________________________________________________________________*______________________________________________________________________|
  • |_*________________________________________________________________________________________________________________________________________________________________________|

4 inputs(s) for total of 160.090000000000 xmr

key image 00: a37c4c539dec13b5f2f644929d6f5dd434a4c4011d829021d40c617918fd09ad amount: 0.050000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7e1ec688aa38e9c41c9c83c4fdd356abfcd0d58a0bcb1bb991e6d4ca072331d5 00132395 1 4/9 2014-07-17 07:57:54 10:118:23:08:29
key image 01: a5a0678136ce49360245fb80dd770077ab6f12e4833f195efa16ca9e509f8806 amount: 0.040000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f126a35d20473a5285b30d59a5d08fcb75d452c3bcbb26f780bc7939882d907c 00114050 1 1/9 2014-07-04 13:56:46 10:131:17:09:37
key image 02: 8546d79e263f261914765781967ba028797a9b7a9912b08d1e2f198fcf1ddaef amount: 70.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1c2945ba5ff5e80aefa23edcb17be6c8877a55d0c6b99b6463dbc9b8990a3134 00123211 1 1/6 2014-07-10 23:24:28 10:125:07:41:55
key image 03: 5cce8d674cafc2401f36272d7ee35ad713a969bd128e89914d9d66f614647619 amount: 90.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d2ea004d8e21dcf32336db21f48fd31cab1fed256a105148a0d40a02615a3e7c 00110460 1 4/3 2014-07-02 01:59:03 10:134:05:07:20
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 50000000000, "key_offsets": [ 105819 ], "k_image": "a37c4c539dec13b5f2f644929d6f5dd434a4c4011d829021d40c617918fd09ad" } }, { "key": { "amount": 40000000000, "key_offsets": [ 117566 ], "k_image": "a5a0678136ce49360245fb80dd770077ab6f12e4833f195efa16ca9e509f8806" } }, { "key": { "amount": 70000000000000, "key_offsets": [ 904 ], "k_image": "8546d79e263f261914765781967ba028797a9b7a9912b08d1e2f198fcf1ddaef" } }, { "key": { "amount": 90000000000000, "key_offsets": [ 1413 ], "k_image": "5cce8d674cafc2401f36272d7ee35ad713a969bd128e89914d9d66f614647619" } } ], "vout": [ { "amount": 900000000, "target": { "key": "489a79d9fddf9a2615c7da6e45b361fdda6107d44f608023abf6efbb0c9102d3" } }, { "amount": 6000000000, "target": { "key": "0d3ce0719f1beaaaa6200d0903b545c6c3f19c28eda3b5ed3a3fc7988e605c2b" } }, { "amount": 8000000000, "target": { "key": "f6d3520aee82a23f6e95e78906dc521167ee89a136e49a0f854e97ec70f67e9e" } }, { "amount": 70000000000, "target": { "key": "445808f1ab4b9ea961bd9ccf4bde657eadb2701e9e2b7826d3c0db442aebdec4" } }, { "amount": 200000000000, "target": { "key": "623139ad948510cc33151353a74b1d96bea3076312c904dd56278256aec04f32" } }, { "amount": 800000000000, "target": { "key": "d0a8384349ef867143101b0ccb6fb785a445dabc9e7785ed0551c6f2cfa07a15" } }, { "amount": 1000000000000, "target": { "key": "43e6de550adfac6d2f6c7bfe268134d5a8561bc33423601c5e67e817e14ee06d" } }, { "amount": 8000000000000, "target": { "key": "dbbfa45366a333dd2e1cbed590891867210b83e3daca144cdbba60abb39b19af" } }, { "amount": 50000000000000, "target": { "key": "3b1e4a6675f44f68cdfe0396877eff249a3910bca25b4667fd350dbbcdc9009a" } }, { "amount": 100000000000000, "target": { "key": "bc1e472891fa0ce91d5870cd2e2380a95e3b4bd109313fe7f51045a9121d8b5f" } } ], "extra": [ 2, 33, 0, 45, 89, 102, 247, 186, 188, 196, 30, 57, 187, 3, 237, 199, 205, 4, 227, 19, 200, 172, 5, 107, 35, 3, 19, 205, 253, 13, 189, 87, 165, 184, 157, 1, 55, 84, 173, 155, 41, 180, 112, 140, 197, 41, 15, 210, 152, 185, 46, 193, 226, 179, 7, 121, 156, 49, 47, 249, 185, 98, 179, 175, 177, 91, 59, 72 ], "signatures": [ "49113c258d4943105c1fdc4b04e1a3ff7f102fa2a50039b37ef47ad89904340e5a706666036ed8823c40f0235a7d3e646383dbc830678e185dc62921d43e5105", "e2474d773b44df8ff869c75382677c31ff54094f81004a1e2ee89d3e61afcf0c375e6c2e1d3ba0c140b8542b9e1342cfba93f7a6fc08ccdd02a1ad8322703e00", "e0fca75e4d5b4ca7855983ac6b4914f190e8ceab9f8a787cb427c1a70214060f50fd2f33e1bf571d76ae61a10bbbc9224cecbb6dde70ac4caad08d32617aa700", "a8788058d1f031d9503b7bc34fa13373b4ae768a85cb758e068aec08d5f26805f25e94c41709fb36d23dfa1b70d32f7673035c78e425857bd740b0d48924fd00"] }


Less details
source code | moneroexplorer