Monero Transaction b20cd104e10da4483d298abd2ae2a39575fbf9c09865ee9660d50471bf0fc682

Autorefresh is OFF

Tx hash: b20cd104e10da4483d298abd2ae2a39575fbf9c09865ee9660d50471bf0fc682

Tx prefix hash: c76ca58418293394f1b0220636680c5bf8763dc4d4249d373c0472aff0778e8a
Tx public key: 3f6db70b2dfc2ddf6d22162f2d3b32cb9ffcb00c0c0743329a519281328ebbff

Transaction b20cd104e10da4483d298abd2ae2a39575fbf9c09865ee9660d50471bf0fc682 was carried out on the Monero network on 2014-06-18 01:52:34. The transaction has 3152072 confirmations. Total output fee is 0.000001000000 XMR.

Timestamp: 1403056354 Timestamp [UTC]: 2014-06-18 01:52:34 Age [y:d:h:m:s]: 10:098:05:27:47
Block: 90127 Fee (per_kB): 0.000001000000 (0.000002805479) Tx size: 0.3564 kB
Tx version: 1 No of confirmations: 3152072 RingCT/type: no
Extra: 013f6db70b2dfc2ddf6d22162f2d3b32cb9ffcb00c0c0743329a519281328ebbff

3 output(s) for total of 3.000000000000 xmr

stealth address amount amount idx tag
00: ab61dee69271dc1bbd81615662e7aff8a55b9d0df21c4d9d94651da13e164a29 0.300000000000 45413 of 976536 -
01: 098e2b4b19087d12b739cddda526c0f3eb4eb4708a0842c239af545c78e35340 0.700000000000 21624 of 514466 -
02: fb5e7df0795a875d5d128d370a442c0564c95b6c79114cfef002418dda6ded33 2.000000000000 14697 of 434057 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-17 21:52:42 till 2014-06-17 23:52:42; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|

2 inputs(s) for total of 3.000001000000 xmr

key image 00: 9c7e4d2b2ad35737975b74b93de9cc6171f2845b9495d924b07b5b791effeb86 amount: 0.000001000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a39c8db36f99cee7d3d895e6062d0f6af28ba00a4a724b6550a9d7ac078104c8 00089873 1 7/13 2014-06-17 22:52:42 10:098:08:27:39
key image 01: 9bc43f6d80c8b8b16711032053eebd5993a0db4806bc41b703ba9aa831192470 amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 39c417ac64fc3fdc846b8932541a8f56cd1bfa637ab93a863aee1f5f2a762299 00089873 1 6/9 2014-06-17 22:52:42 10:098:08:27:39
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 1000000, "key_offsets": [ 18348 ], "k_image": "9c7e4d2b2ad35737975b74b93de9cc6171f2845b9495d924b07b5b791effeb86" } }, { "key": { "amount": 3000000000000, "key_offsets": [ 11201 ], "k_image": "9bc43f6d80c8b8b16711032053eebd5993a0db4806bc41b703ba9aa831192470" } } ], "vout": [ { "amount": 300000000000, "target": { "key": "ab61dee69271dc1bbd81615662e7aff8a55b9d0df21c4d9d94651da13e164a29" } }, { "amount": 700000000000, "target": { "key": "098e2b4b19087d12b739cddda526c0f3eb4eb4708a0842c239af545c78e35340" } }, { "amount": 2000000000000, "target": { "key": "fb5e7df0795a875d5d128d370a442c0564c95b6c79114cfef002418dda6ded33" } } ], "extra": [ 1, 63, 109, 183, 11, 45, 252, 45, 223, 109, 34, 22, 47, 45, 59, 50, 203, 159, 252, 176, 12, 12, 7, 67, 50, 154, 81, 146, 129, 50, 142, 187, 255 ], "signatures": [ "691570332d28fdeddd405ef5b9b4a2a9c3fde4e6d0a8cd55197b1661b2bb3d0060b8c2641f1afa661fa08911635fa4c2e316720c46d7b193725c4438703e740b", "6ce0feeb60aaf6810af7a04d8ce0959a5e91ae8b485fcbb882a1ceefbfc5340362714f8dc9da1fff0ff534c50a50b5308a88b6260ffbfb29272a3e6e95475e06"] }


Less details
source code | moneroexplorer