Monero Transaction 20b93695a62c0d0d1c950fcf2552dc9f99f420b4cf1208b8418a2a2b5115d5be

Autorefresh is OFF

Tx hash: 20b93695a62c0d0d1c950fcf2552dc9f99f420b4cf1208b8418a2a2b5115d5be

Tx prefix hash: 45d7b557a03409e949a48a651b3daf1c0cbe683d8a4c17ac706ef9b4900dbe59
Tx public key: aaf1d22c3318b0db93c05be412b6a32ece33da0acf3e217829f82e28ff50b64d
Payment id: 8b7b223b392ecc787c10d4643789ff3eca4d2d29c80278ec9a8f794ed2350a1d

Transaction 20b93695a62c0d0d1c950fcf2552dc9f99f420b4cf1208b8418a2a2b5115d5be was carried out on the Monero network on 2016-12-05 14:51:52. The transaction has 2106083 confirmations. Total output fee is 0.004000000000 XMR.

Timestamp: 1480949512 Timestamp [UTC]: 2016-12-05 14:51:52 Age [y:d:h:m:s]: 08:008:05:11:08
Block: 1194747 Fee (per_kB): 0.004000000000 (0.003338223309) Tx size: 1.1982 kB
Tx version: 1 No of confirmations: 2106083 RingCT/type: no
Extra: 0221008b7b223b392ecc787c10d4643789ff3eca4d2d29c80278ec9a8f794ed2350a1d01aaf1d22c3318b0db93c05be412b6a32ece33da0acf3e217829f82e28ff50b64d

6 output(s) for total of 3.536000000000 xmr

stealth address amount amount idx tag
00: 1c30e8ab661b0d0a5da27a0e5112cae0ed706a254e845cdeb595b37824b7ddd0 0.002000000000 78774 of 95915 -
01: f12b0143c24ae24d43540e2a9501a5814405b7e66c5ea4247167978a40f03329 0.004000000000 71370 of 89181 -
02: bc2c6fed11eee59ddcbec3a44440721ef2437fbf860a6e78cc7bd16faddb6a97 0.030000000000 306370 of 324336 -
03: 4c945239b14bc9de0e7fd274b3032ef22b188270a593c1f5ebf52af8cd2639be 0.500000000000 1091566 of 1118624 -
04: 649bb8aef72ed305f0a6a9a882c03f5a5b7f9d87f6374cf8d86fb34639c8f946 1.000000000000 841986 of 874629 -
05: 0519511140851d686e06ff011aa1f29118ac459628b5c04b4e5ad47e23d49cb4 2.000000000000 419317 of 434057 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-24 14:36:10 till 2016-12-04 20:30:54; resolution: 5.26 days)

  • |__*_____________________*__________*_____________________________________________________________________________________________________________________________________*|
  • |_*__________________________________________*__________________________________________________________________*_________________________________________________*________|
  • |______________________**________________*________________________________________________________________________________________________________________________*________|

3 inputs(s) for total of 3.540000000000 xmr

key image 00: 7d71a1a8884c2e28d9ec6d73d1166ac19c4056c314ac14ab93239ee53d56de2c amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c7eb34ed87f5cbf2cd6b9c4c531420de57b72a4b48a0adeff688faf4a2bc3604 00113724 1 4/22 2014-07-04 08:34:12 10:163:11:28:48
- 01: 26b12d051d798d4c29050a193a83138fca4a72a1bedf7524c74f56dc6113011d 00278376 1 19/112 2014-10-27 04:43:22 10:048:15:19:38
- 02: ae9e1fb33ed5dde68bd2fd7a69f2fc0190f39714d3b8fdda2881798e46afa6b4 00363974 1 8/51 2014-12-26 04:53:26 09:353:15:09:34
- 03: eed5af4358cfe5fe62ffd0ff04de1336f384a81e2d5bac04c3cd7e230841553d 01194212 4 5/6 2016-12-04 19:30:54 08:009:00:32:06
key image 01: d2b8a735444b6a0f5783c9fb9307a6030a9d033366c49abc0f760e60fb335f68 amount: 0.040000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: cb0f941f6ef0edd9ab974175c9b081aa4f1fb6be6d19dff1cce095d412973f8b 00099743 1 6/93 2014-06-24 15:36:10 10:173:04:26:50
- 01: ec19a523bd21502c8fb2fb9059e085322da55484cc527769748cb10fdf511647 00426067 1 170/3 2015-02-07 14:47:09 09:310:05:15:51
- 02: 0acede7542a83c573cd8e9a0cfd788cff2aff50a0150e39e11c0e6a09db6d22c 00933479 0 0/4 2016-01-29 14:31:51 08:319:05:31:09
- 03: aafc07d86cb13cbcd7b4c5ceb2a933f1434bc4b65b34e69064b612c3e76f9bd0 01160113 4 11/8 2016-10-18 11:00:08 08:056:09:02:52
key image 02: cc67a2ec678cfb02f40aee71d328e3f593d60069f678d08ee9abfc69c32b6b48 amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 69d044b8c7b5fa35bcf47e64b68772a08b4412214bd197344241505ccb0a3d19 00262321 3 27/80 2014-10-15 21:04:24 10:059:22:58:36
- 01: c532e6036aa9c74d96afec9bee9acf3aa457bccb38b96b4445734023e1ea3bf6 00273735 1 6/100 2014-10-23 20:53:35 10:051:23:09:25
- 02: 08635dfb20b37629720d3962cc2462aeac53908a82151fa1ce99ee1543ae944c 00396436 1 80/101 2015-01-17 23:26:32 09:330:20:36:28
- 03: 9bc20db29c531d8e96583683011f1f27817f39e13df823a11fed2a1c3347612c 01160113 4 11/8 2016-10-18 11:00:08 08:056:09:02:52
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 500000000000, "key_offsets": [ 88727, 321617, 139342, 541339 ], "k_image": "7d71a1a8884c2e28d9ec6d73d1166ac19c4056c314ac14ab93239ee53d56de2c" } }, { "key": { "amount": 40000000000, "key_offsets": [ 114001, 39317, 64524, 45440 ], "k_image": "d2b8a735444b6a0f5783c9fb9307a6030a9d033366c49abc0f760e60fb335f68" } }, { "key": { "amount": 3000000000000, "key_offsets": [ 87347, 13036, 69125, 110196 ], "k_image": "cc67a2ec678cfb02f40aee71d328e3f593d60069f678d08ee9abfc69c32b6b48" } } ], "vout": [ { "amount": 2000000000, "target": { "key": "1c30e8ab661b0d0a5da27a0e5112cae0ed706a254e845cdeb595b37824b7ddd0" } }, { "amount": 4000000000, "target": { "key": "f12b0143c24ae24d43540e2a9501a5814405b7e66c5ea4247167978a40f03329" } }, { "amount": 30000000000, "target": { "key": "bc2c6fed11eee59ddcbec3a44440721ef2437fbf860a6e78cc7bd16faddb6a97" } }, { "amount": 500000000000, "target": { "key": "4c945239b14bc9de0e7fd274b3032ef22b188270a593c1f5ebf52af8cd2639be" } }, { "amount": 1000000000000, "target": { "key": "649bb8aef72ed305f0a6a9a882c03f5a5b7f9d87f6374cf8d86fb34639c8f946" } }, { "amount": 2000000000000, "target": { "key": "0519511140851d686e06ff011aa1f29118ac459628b5c04b4e5ad47e23d49cb4" } } ], "extra": [ 2, 33, 0, 139, 123, 34, 59, 57, 46, 204, 120, 124, 16, 212, 100, 55, 137, 255, 62, 202, 77, 45, 41, 200, 2, 120, 236, 154, 143, 121, 78, 210, 53, 10, 29, 1, 170, 241, 210, 44, 51, 24, 176, 219, 147, 192, 91, 228, 18, 182, 163, 46, 206, 51, 218, 10, 207, 62, 33, 120, 41, 248, 46, 40, 255, 80, 182, 77 ], "signatures": [ "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", "37b9d476fd5d30fff90bec4f9a292db6838e1e4ecd2b87a0c48beeaf64b1b40083d4dcfa4d5539cc1129cb021917559a5ac51a87a692c94cfd2f0d1368b6dc0fdaecd81d766118d0692d98d20bb3eb5a96bc8062036dac0a410daaa18d72660fd2b51f433c4c500eef4dc4cc8aebe87a314dceca9992cdf32307c3a6de15830a54a699a5c59b7c7bdf41515d442c5dba6722104a19f60dccd8b6e21aa5fbc509a206b94330139c5c0e4fae1b9b8c530a48eb7bd2217087f4638d9046f0abe7034b782bc0f9510b59d84a2f7731afee55f649a153becb61fbc7127695c499120692ed8fb77417f0e28d18683c3e2f06328298380be25fb5437796c9894bf0b209", "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"] }


Less details
source code | moneroexplorer