Monero Transaction 20f307b778ebc8bab624bccc834aa76a500d08c4255348dc80f0b09f1e6fe9c5

Autorefresh is OFF

Tx hash: 20f307b778ebc8bab624bccc834aa76a500d08c4255348dc80f0b09f1e6fe9c5

Tx public key: 16b636380485ff9f45473960fd93546520a1ca90e5b7dea2fa83499002a67f93
Payment id: bb4a1dc5f3418f9e1980f6ad629d0dbaefe481365deb5353b7f13ab51d908d25

Transaction 20f307b778ebc8bab624bccc834aa76a500d08c4255348dc80f0b09f1e6fe9c5 was carried out on the Monero network on 2016-02-09 20:00:47. The transaction has 2422455 confirmations. Total output fee is 0.100000000000 XMR.

Timestamp: 1455048047 Timestamp [UTC]: 2016-02-09 20:00:47 Age [y:d:h:m:s]: 09:041:09:43:36
Block: 949240 Fee (per_kB): 0.100000000000 (0.133507170795) Tx size: 0.7490 kB
Tx version: 1 No of confirmations: 2422455 RingCT/type: no
Extra: 0116b636380485ff9f45473960fd93546520a1ca90e5b7dea2fa83499002a67f93022100bb4a1dc5f3418f9e1980f6ad629d0dbaefe481365deb5353b7f13ab51d908d25

7 output(s) for total of 0.882848569881 xmr

stealth address amount amount idx tag
00: 5f4423884b08cbc15023d4b01e7bd43febc1dc827b36368b8b38db17a484c731 0.000306514305 0 of 1 -
01: e5af1f0b6989a600b92a4d9c3a54919b9112ceae497357dd1ba610686eec8d5e 0.008000000000 187422 of 245068 -
02: ff3ee9d48b19b181f440d51365b8aec7808478eeabc160e538e66269d5dd8979 0.080000000000 186588 of 269576 -
03: 24e22ff169e50a8c2ae354cf9e6d5f1f01a5835a6ca538404963cd46bbeb1c32 0.400000000000 554700 of 688584 -
04: 9e73d67d14e1e194db33d8a26a775643c9ab2998cc7871de15026204a61d100b 0.004542055576 0 of 1 -
05: 1cf27f4f85da1eb0c11f75f16736bc17b24e6cdfed93eadde560618e8abf7076 0.090000000000 215833 of 317822 -
06: e12bc27987f8cacf96e99b384d19be057a3b5321c58502a60d27600dc0892459 0.300000000000 779129 of 976536 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



4 inputs(s) for total of 0.982848569881 xmr

key image 00: 2ce3bdff9db946a473e6e264ba45030188541b2f628e55e2e39d592705b27da1 amount: 0.070000000000
ring members blk
- 00: bb1bb620b0deceaefbb47305ed6f3d3531b07e51d78fb04509f5aa945abc7df8 00949119
key image 01: 8ace1b4fc8f825baa38af15ac28c9a5a01ea899f1fce847c3125425c4196cf91 amount: 0.004848569881
ring members blk
- 00: 6578619b7d5c6831702519bfe0d68dabf7d5fcda9b295e043ff733de76865780 00930849
key image 02: f02036b51b4f519b5a2620b51dee3549a3ed54d97b4a62e8d1f48d8777d95350 amount: 0.008000000000
ring members blk
- 00: 3085fdae1a75137252cac81506e1747bbd0974026e61f58f98580ea55484d81b 00947497
key image 03: 5cc80bd20f3ce1fb927c1d28838906c8a068ab20fd43c0a29baceb71b1610656 amount: 0.900000000000
ring members blk
- 00: 7d89ab28f4833e3543094a3bebe920b458f8708544b2f1f64a48f9328bf0936e 00947029
More details
source code | moneroexplorer