Monero Transaction 20d9fab6f8f571496ce0176c0009a66b0c6b6e89e76165572cd90a5e43e39979

Autorefresh is OFF

Tx hash: 20d9fab6f8f571496ce0176c0009a66b0c6b6e89e76165572cd90a5e43e39979

Tx prefix hash: 5773584a3133cd7a4a67b4f8b6c64cf815280ced45e89c48ac7939324167c425
Tx public key: 836ec89c943ba0b10c313992ff1afac0c412ff539d7bb7e3bd4ca3b5954e0d2d

Transaction 20d9fab6f8f571496ce0176c0009a66b0c6b6e89e76165572cd90a5e43e39979 was carried out on the Monero network on 2014-08-09 08:06:57. The transaction has 3128553 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1407571617 Timestamp [UTC]: 2014-08-09 08:06:57 Age [y:d:h:m:s]: 10:118:02:24:24
Block: 165551 Fee (per_kB): 0.010000000000 (0.008075709779) Tx size: 1.2383 kB
Tx version: 1 No of confirmations: 3128553 RingCT/type: no
Extra: 01836ec89c943ba0b10c313992ff1afac0c412ff539d7bb7e3bd4ca3b5954e0d2d

8 output(s) for total of 15.080000000000 xmr

stealth address amount amount idx tag
00: f8564433b5e943367a71af2632d8d365fb36197f9e5b1285a1217d42c3cf51c9 0.080000000000 89832 of 269576 -
01: 848543d6ee45b7ef0b3a49d4120770d7304d0c5cf6fec42e7b46e7793f06bc24 0.100000000000 396597 of 982315 -
02: b815b5e419b9c721fbede4dd0ac764ae933d25b1555a958662e4fc86344d4066 0.200000000000 338595 of 1272210 -
03: 216a946f49a606e3fbdd55c8716c9591414c76a18aa0d348f0eb5ee2349fd65a 0.500000000000 210503 of 1118624 -
04: bd5fd170afdb03ec526e4433057ee637170122f9a5e6cc2ee1d942721b85a680 0.500000000000 210504 of 1118624 -
05: 3aea2ace40060e43f5876b4eb7c2fca69d5532ecacdd9889f876ded2184930b6 0.700000000000 101009 of 514467 -
06: f1b7550db19f43d47c787ef18d043cfefe8a9194d47c1e6577e6790e11f10dae 3.000000000000 42896 of 300495 -
07: d5918db7324b2f80c473622a774605917e54206077e1d3c8da5c83a54aae8cb8 10.000000000000 190454 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-04-19 10:53:50 till 2014-08-09 08:15:39; resolution: 0.66 days)

  • |________________________________________________________________________*_________________*_________________*___________________________________________________________*_|
  • |___________*______________________________________*____________________*________________________________________________________________________________________________*_|
  • |_*__*____________________________________________________________________________________________________________________________________________________________________*|

3 inputs(s) for total of 15.090000000000 xmr

key image 00: 6cf30ce1cc37b87295adf28484d698be49c1b4d8fc127552da7bc696845b7839 amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d061665cb58026d7641815db36a2252be0925942554980f677eae84f177cb3cf 00072292 1 1/69 2014-06-05 20:09:10 10:182:14:22:11
- 01: ee1f3fe131d04d66fd40770b810af4944b8ca9c12cb949e71ae651b2538b4247 00089777 1 2/75 2014-06-17 21:31:19 10:170:13:00:02
- 02: 26137553fb9c3a3c336f6e85f3930d2f20a0ebc4aa29a47579ab962293c4eaa4 00106892 0 0/5 2014-06-29 14:56:29 10:158:19:34:52
- 03: 655c06220423077dd30ae9909717d24185da679c23974eb15b2581af1f137b16 00164338 0 0/4 2014-08-08 11:12:51 10:118:23:18:30
key image 01: c46dd4fe0a80f845afc024864adb0e13bb176685a4e4cb455629c48acc7dffa3 amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3ab76df945c0bf861aa5e64afa563c9ac06c2ffd5391e12c6d7555724f208890 00011831 0 0/8 2014-04-26 06:28:12 10:223:04:03:09
- 01: 2e0e7b94c91a1a009938169ae03330973f86cddc1644bed085ec65dddad12eec 00051458 1 19/725 2014-05-22 13:06:21 10:196:21:25:00
- 02: 3a6fb557ace5463704424f92e69a90ce141ebb0768893c3ae73cb01905507d90 00071757 1 3/38 2014-06-05 10:36:00 10:182:23:55:21
- 03: 00f942c8d835e519e63480a41cceb3b99394e20cafa14dc90a5556bdcaf22874 00164081 4 7/8 2014-08-08 07:45:52 10:119:02:45:29
key image 02: 95173cf2be388abc1cc230552657e179f19b9b6e068e5bd339dbe9b68fc9cef2 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3890c57288bdc1da319a2e4b0f0c1bab0f030a875baae12a2e352281cb2c1c83 00001619 0 0/8 2014-04-19 11:53:50 10:229:22:37:31
- 01: c3d2d28d15008db378949f51531226a537e7c2decb4f214637e533ae3dc2de81 00002313 0 0/8 2014-04-20 00:41:01 10:229:09:50:20
- 02: 6dd5c1a38aa638a12fe00352630f85ffadfbff809cb0b56b1d6b10ecec14c549 00005047 0 0/8 2014-04-21 19:00:32 10:227:15:30:49
- 03: 7b5906f9fb7051c7b7afd051941d27a62fe3ab28c368746fffad6cb3609c97c3 00165483 0 0/5 2014-08-09 07:15:39 10:118:03:15:42
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000000, "key_offsets": [ 4986, 8858, 11749, 70138 ], "k_image": "6cf30ce1cc37b87295adf28484d698be49c1b4d8fc127552da7bc696845b7839" } }, { "key": { "amount": 90000000000, "key_offsets": [ 1057, 5400, 14551, 79506 ], "k_image": "c46dd4fe0a80f845afc024864adb0e13bb176685a4e4cb455629c48acc7dffa3" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 1620, 693, 2741, 185323 ], "k_image": "95173cf2be388abc1cc230552657e179f19b9b6e068e5bd339dbe9b68fc9cef2" } } ], "vout": [ { "amount": 80000000000, "target": { "key": "f8564433b5e943367a71af2632d8d365fb36197f9e5b1285a1217d42c3cf51c9" } }, { "amount": 100000000000, "target": { "key": "848543d6ee45b7ef0b3a49d4120770d7304d0c5cf6fec42e7b46e7793f06bc24" } }, { "amount": 200000000000, "target": { "key": "b815b5e419b9c721fbede4dd0ac764ae933d25b1555a958662e4fc86344d4066" } }, { "amount": 500000000000, "target": { "key": "216a946f49a606e3fbdd55c8716c9591414c76a18aa0d348f0eb5ee2349fd65a" } }, { "amount": 500000000000, "target": { "key": "bd5fd170afdb03ec526e4433057ee637170122f9a5e6cc2ee1d942721b85a680" } }, { "amount": 700000000000, "target": { "key": "3aea2ace40060e43f5876b4eb7c2fca69d5532ecacdd9889f876ded2184930b6" } }, { "amount": 3000000000000, "target": { "key": "f1b7550db19f43d47c787ef18d043cfefe8a9194d47c1e6577e6790e11f10dae" } }, { "amount": 10000000000000, "target": { "key": "d5918db7324b2f80c473622a774605917e54206077e1d3c8da5c83a54aae8cb8" } } ], "extra": [ 1, 131, 110, 200, 156, 148, 59, 160, 177, 12, 49, 57, 146, 255, 26, 250, 192, 196, 18, 255, 83, 157, 123, 183, 227, 189, 76, 163, 181, 149, 78, 13, 45 ], "signatures": [ "8fd0382dc4de0eb3ca1f36523386b7e1f274dba03ce56dfc3fe80317d638f80358e2b3f6bced817fd224fb9693984a1708f25025ab93e72eea594274a135a703e1f6aaa7fc4586edcf7bcf1ad44721cb5a4d7eb8641f335e1014e913fa97e405c11dad1d1982eef22d6403731ac957c01530cc15b3851b50b75fca82c8c8c405ad2ca02bba508e8e3297a755aa76c4c029bcea8172716080c47f772c4d6feb07f8217b9b7d73722a8d02b76bc604784154cd84e0f1e354753bcaed9b98391f0c84c65b976ffe8a35ff901f8bdc3df0390cf8addb0409d1c2ab3b987aab5a310ea3cef73428a5ca00acbaa9a3992638fc3f4c638069d742f0e9ce0e0332419d09", "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", "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"] }


Less details
source code | moneroexplorer