Monero Transaction 20da8b3ad62a8435640e44299f6c5a3a8fbd4f1ca83c163de9b80ec2c1b628dc

Autorefresh is OFF

Tx hash: 20da8b3ad62a8435640e44299f6c5a3a8fbd4f1ca83c163de9b80ec2c1b628dc

Tx prefix hash: 4985cfc814b1887479449336858dde197b4d468aa1d58035d51570622b86900c
Tx public key: 2d66ea0d066d34f77d18f602cd7b0a7b9e2d794044bc993ed661c77b82b7f2d0
Payment id: 2d1dda9651ce977aef317f980e68fc0f3505d67af806b6dbca091f41c39338c3

Transaction 20da8b3ad62a8435640e44299f6c5a3a8fbd4f1ca83c163de9b80ec2c1b628dc was carried out on the Monero network on 2014-08-02 15:02:04. The transaction has 3122327 confirmations. Total output fee is 0.005645786872 XMR.

Timestamp: 1406991724 Timestamp [UTC]: 2014-08-02 15:02:04 Age [y:d:h:m:s]: 10:102:19:41:29
Block: 155945 Fee (per_kB): 0.005645786872 (0.012019305108) Tx size: 0.4697 kB
Tx version: 1 No of confirmations: 3122327 RingCT/type: no
Extra: 0221002d1dda9651ce977aef317f980e68fc0f3505d67af806b6dbca091f41c39338c3012d66ea0d066d34f77d18f602cd7b0a7b9e2d794044bc993ed661c77b82b7f2d0

5 output(s) for total of 0.754354213128 xmr

stealth address amount amount idx tag
00: f99ce89391554ff0fe8b9249d8d2acd6c957aec7a4b06421040c38c6a3e2b663 0.004354213128 0 of 1 -
01: 6b8f212ef9e4cb4bbb8700da3c441f8bca38acefab3f898b4b0dd701ff40e5b7 0.070000000000 90543 of 263947 -
02: dd212037add2e1a6b6bf6e7c4dba45cb0982ffd70c75bf9c9543d309cbb84266 0.080000000000 85867 of 269576 -
03: 2a1c9f0f75084a0754e0c148a453096c0241768f12a7240792d8d5bd6d39074c 0.100000000000 357543 of 982315 -
04: aa3427802dcebefc583d22ceda9c34fc3f82a8ac490bc06e0c17b5eb8323b1e3 0.500000000000 189676 of 1118624 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-08-02 07:27:52 till 2014-08-02 13:28:08; resolution: 0.00 days)

  • |_____________________________________________________________________________________________________________________________________________*____________________________|
  • |_____________________________*____________________________________________________________________________________________________________________________________________|

2 inputs(s) for total of 0.760000000000 xmr

key image 00: 71e1e38f3f812d9e979016fb91845dafedd5fdad23f3d022d7c58eda00b3b1c8 amount: 0.060000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3400e0d3f118f2357885d5af4a6ec586c138ef8978e5eb5a81a31fab2446e08d 00155778 1 9/7 2014-08-02 12:28:08 10:102:22:15:25
key image 01: 81fd24b432256768a483a55c46e6beb2531e8c2f6384ea8ef18a042a450267bf amount: 0.700000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 25222ba4f024ec1480e867b7027e0ccd63250374518cfa8c8d3f4e792b24c001 00155535 1 1/7 2014-08-02 08:27:52 10:103:02:15:41
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 60000000000, "key_offsets": [ 99297 ], "k_image": "71e1e38f3f812d9e979016fb91845dafedd5fdad23f3d022d7c58eda00b3b1c8" } }, { "key": { "amount": 700000000000, "key_offsets": [ 92377 ], "k_image": "81fd24b432256768a483a55c46e6beb2531e8c2f6384ea8ef18a042a450267bf" } } ], "vout": [ { "amount": 4354213128, "target": { "key": "f99ce89391554ff0fe8b9249d8d2acd6c957aec7a4b06421040c38c6a3e2b663" } }, { "amount": 70000000000, "target": { "key": "6b8f212ef9e4cb4bbb8700da3c441f8bca38acefab3f898b4b0dd701ff40e5b7" } }, { "amount": 80000000000, "target": { "key": "dd212037add2e1a6b6bf6e7c4dba45cb0982ffd70c75bf9c9543d309cbb84266" } }, { "amount": 100000000000, "target": { "key": "2a1c9f0f75084a0754e0c148a453096c0241768f12a7240792d8d5bd6d39074c" } }, { "amount": 500000000000, "target": { "key": "aa3427802dcebefc583d22ceda9c34fc3f82a8ac490bc06e0c17b5eb8323b1e3" } } ], "extra": [ 2, 33, 0, 45, 29, 218, 150, 81, 206, 151, 122, 239, 49, 127, 152, 14, 104, 252, 15, 53, 5, 214, 122, 248, 6, 182, 219, 202, 9, 31, 65, 195, 147, 56, 195, 1, 45, 102, 234, 13, 6, 109, 52, 247, 125, 24, 246, 2, 205, 123, 10, 123, 158, 45, 121, 64, 68, 188, 153, 62, 214, 97, 199, 123, 130, 183, 242, 208 ], "signatures": [ "3e2ddfa63ed61d53fac0f0161e7d3841ebdbba347e197ba6dc50b56633ac6a0d76d99c61f6268bf2093f567fd7f722d2f2b8271a0970d70f67634d49b621720c", "eadb5e69f034d016f25ad5dd1d546d62eebc155fc47ab1c78b8bddfc9478290de53131861066c7d0358121a97365c4a906c0b0637241619748805b4ddf490800"] }


Less details
source code | moneroexplorer