Monero Transaction 20cafa4f9509c597c25672da25368a85f760f7622cb8370f542e357e81318810

Autorefresh is OFF

Tx hash: 20cafa4f9509c597c25672da25368a85f760f7622cb8370f542e357e81318810

Tx prefix hash: 37fa38382bd9e30b943824daa3ff776bc855c722f916c0f9fa76c7827d523f25
Tx public key: e66a26be87da090bc95dfe73b31d05e603d592d3b8e789cfeeb5cbb7f00b15b6

Transaction 20cafa4f9509c597c25672da25368a85f760f7622cb8370f542e357e81318810 was carried out on the Monero network on 2016-01-01 12:58:46. The transaction has 2409847 confirmations. Total output fee is 0.012737177739 XMR.

Timestamp: 1451653126 Timestamp [UTC]: 2016-01-01 12:58:46 Age [y:d:h:m:s]: 08:350:23:32:27
Block: 893639 Fee (per_kB): 0.012737177739 (0.018712869447) Tx size: 0.6807 kB
Tx version: 1 No of confirmations: 2409847 RingCT/type: no
Extra: 01e66a26be87da090bc95dfe73b31d05e603d592d3b8e789cfeeb5cbb7f00b15b6

6 output(s) for total of 8.089923350000 xmr

stealth address amount amount idx tag
00: 7e85fb78c29d96f4dc1fa33c943bc5c33ce08132cc68b1e0cd846d0f1984c560 0.009923350000 1 of 2 -
01: 80fbaff7541ae1bc758ff8e191583c1199cb277677d291e6fbc0d3dca500a2c5 0.020000000000 296576 of 381492 -
02: 5d15652b21c1c0c34de586b9e43d1f39e76136b7c5976d4701c0645c4acc596b 0.060000000000 183824 of 264760 -
03: 31b92139334a6bba80f0d0f7b83d13e34d9f6ebc61f78b77bdb1fe9b3333b3bc 0.500000000000 919752 of 1118624 -
04: f7479e674005c510d48f1435246c4f8547a539890a278598b62d94b12ef9b4b8 0.500000000000 919753 of 1118624 -
05: 32765804eb42c55275501a4a8d21a41dd4c22965bbd7d4a3d7789f2e9d3d0d99 7.000000000000 161595 of 285521 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-11-07 09:16:03 till 2015-12-30 11:33:15; resolution: 0.31 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |__________________________________________________________________________________________________________________________________________________________*_______________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |________________________________________________________________________________________________________________________________________________________________________*_|

4 inputs(s) for total of 8.102660527739 xmr

key image 00: 5f0442a5bda63472373d680a3d435f3c1015559a9637f508a2739d07bbaa1c5b amount: 0.002660527739
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 685845c2268d66c978d83dd2d38a79266a712537c8f29b054993f61b5dd198c1 00815642 0 0/3 2015-11-07 10:16:03 09:041:02:15:10
key image 01: 9f12b87014791e59abc1728ea8fcac376481145e596664749d34f75b08743fbc amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 60fedde829e4bbf2bf2d01eae2967b2b60337addcabd8978bfdeadbb56d6c17c 00883637 0 0/4 2015-12-25 11:20:50 08:358:01:10:23
key image 02: 4ff1a40b47a17cb32ac5e2fc0b573f7e00e4b339570645cb1d6d2e5a0d9951ec amount: 0.600000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 53be76ba7a0e0372f46507adfdbd519dabfabd9af74ff161d0c4f6f837b1eeeb 00890651 0 0/4 2015-12-30 10:33:15 08:353:01:57:58
key image 03: d7b1e204cf32d4d5f037a1cc38457025ead39d2ffd13d0b9078f14d5653cb594 amount: 7.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d8e5ab590d4c523fea8cc328911e9e174d1f06e8a750103181105766b97e1f5d 00889967 0 0/4 2015-12-29 22:17:00 08:353:14:14:13
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 2660527739, "key_offsets": [ 0 ], "k_image": "5f0442a5bda63472373d680a3d435f3c1015559a9637f508a2739d07bbaa1c5b" } }, { "key": { "amount": 500000000000, "key_offsets": [ 906592 ], "k_image": "9f12b87014791e59abc1728ea8fcac376481145e596664749d34f75b08743fbc" } }, { "key": { "amount": 600000000000, "key_offsets": [ 535603 ], "k_image": "4ff1a40b47a17cb32ac5e2fc0b573f7e00e4b339570645cb1d6d2e5a0d9951ec" } }, { "key": { "amount": 7000000000000, "key_offsets": [ 157505 ], "k_image": "d7b1e204cf32d4d5f037a1cc38457025ead39d2ffd13d0b9078f14d5653cb594" } } ], "vout": [ { "amount": 9923350000, "target": { "key": "7e85fb78c29d96f4dc1fa33c943bc5c33ce08132cc68b1e0cd846d0f1984c560" } }, { "amount": 20000000000, "target": { "key": "80fbaff7541ae1bc758ff8e191583c1199cb277677d291e6fbc0d3dca500a2c5" } }, { "amount": 60000000000, "target": { "key": "5d15652b21c1c0c34de586b9e43d1f39e76136b7c5976d4701c0645c4acc596b" } }, { "amount": 500000000000, "target": { "key": "31b92139334a6bba80f0d0f7b83d13e34d9f6ebc61f78b77bdb1fe9b3333b3bc" } }, { "amount": 500000000000, "target": { "key": "f7479e674005c510d48f1435246c4f8547a539890a278598b62d94b12ef9b4b8" } }, { "amount": 7000000000000, "target": { "key": "32765804eb42c55275501a4a8d21a41dd4c22965bbd7d4a3d7789f2e9d3d0d99" } } ], "extra": [ 1, 230, 106, 38, 190, 135, 218, 9, 11, 201, 93, 254, 115, 179, 29, 5, 230, 3, 213, 146, 211, 184, 231, 137, 207, 238, 181, 203, 183, 240, 11, 21, 182 ], "signatures": [ "68135c86dc65795ea9d9d526f88111715e3964a2e28b6779e1bba79ad9bf73091d5f04583ede2e355e282efb765871ca538daf064705fa833aaaf262032c7e09", "4e91f6beaf97c0027be0ce116e9805c78a6866f7312425b3bb8cea5c41304c0eea98ca1a1fb1359e6390efba60a744f941bca2df49d3162040343ae780b9db02", "e8688c78803fbba0cba6c6b057b62aba27b4b3b80c432a158848ff2b97d659072e39ae5c0f8c9db3ba3ebdf7e2cac40635d02a08287af11210058dad25630c05", "00efa1e7d6f92aca133771363375321d7606805670b5d02d251b5a332012aa01391bf7c796e83ea7750c6f4136f0212c123107962bed026127a541a7bf14dd0b"] }


Less details
source code | moneroexplorer