Monero Transaction f20bdf1c88bbbe19a63ee78af3d3c8985685fd2f5c0fd68885fe967083a88d59

Autorefresh is OFF

Tx hash: f20bdf1c88bbbe19a63ee78af3d3c8985685fd2f5c0fd68885fe967083a88d59

Tx prefix hash: ac355a7d7848703b830e22928adb1ca2e3dfb5b0c430ce48b6f093ed10cc76ee
Tx public key: 03b00500fb73968e3acd39b1abb6d63261c14cf18eb15d84f2df547c5907eb7e
Payment id: 716cc636c25947699bbf7b3e0c55083f030ab5ebcbf24049a33a369e9c39ee0a

Transaction f20bdf1c88bbbe19a63ee78af3d3c8985685fd2f5c0fd68885fe967083a88d59 was carried out on the Monero network on 2014-06-27 07:25:57. The transaction has 3174809 confirmations. Total output fee is 0.005775849338 XMR.

Timestamp: 1403853957 Timestamp [UTC]: 2014-06-27 07:25:57 Age [y:d:h:m:s]: 10:139:04:37:19
Block: 103502 Fee (per_kB): 0.005775849338 (0.006265328095) Tx size: 0.9219 kB
Tx version: 1 No of confirmations: 3174809 RingCT/type: no
Extra: 022100716cc636c25947699bbf7b3e0c55083f030ab5ebcbf24049a33a369e9c39ee0a0103b00500fb73968e3acd39b1abb6d63261c14cf18eb15d84f2df547c5907eb7e

6 output(s) for total of 2.495000000000 xmr

stealth address amount amount idx tag
00: 1967f0349013b1d07c9445b7999eb7cefd2cd32e93168c0faf6bfcada0f43d94 0.005000000000 178453 of 308584 -
01: 1745e2618061a5989c187aa32b5d6dca428c3eeb2d9a755cc733564699e19b68 0.030000000000 142993 of 324336 -
02: e50b47c77efe38753f1325ae50b6c144fa1085dfea10f2f6a29e450b112c5dd7 0.060000000000 86520 of 264760 -
03: e29a3e8ac681ed31e6cdd2272c792d44b31af908ea60e86de4404e8e503c49a4 0.200000000000 97259 of 1272210 -
04: d51c83ce312f1233980ae13e4a8d706316c0bb03ebb079315a2b21197e94f36a 0.200000000000 97260 of 1272210 -
05: d48bbb733d339e788ae6443c9a37186a5a8104b4da1d52fde909759c5fffa0ce 2.000000000000 23322 of 434057 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-22 14:50:52 till 2014-06-27 03:01:37; resolution: 0.03 days)

  • |__*_______________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________*________________________________________________________________|
  • |_______________________________________________________________________________________________________________________________*__________________________________________|
  • |_______________________________________*__________________________________________________________________________________________________________________________________|
  • |___________________________________________________________________________*______________________________________________________________________________________________|
  • |________________________________________________________________________________________________________________________________________________________________________*_|

6 inputs(s) for total of 2.500775849338 xmr

key image 00: ff298cebb23a08d7dcaa66e4e861d0dce46689ffb32e160f8aa6e7d3e3675e3c amount: 0.000775849338
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d555f3b9502d6cb6d9a60382d0e71f1599197cd40c1c105f85e8e8fe5c289156 00096854 1 3/84 2014-06-22 15:50:52 10:143:20:12:24
key image 01: 1fda4c6396d136fef91a6d52849dca51039fb28b5eeca3081c514bf351731403 amount: 0.700000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1024af30656da08b79eaaea4fcd181d05698caa92411a9f17eebca7f2a30f2db 00100747 1 28/72 2014-06-25 09:33:16 10:141:02:30:00
key image 02: 1950592acb16e6166aaf0c5cf5e86d405893e1231629d4ad5e3f8552235a9fc5 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: cad77fb946d5c2c09b17914f214c29125c3e01be868b3adb9f5624b12dafe0b1 00101619 1 15/67 2014-06-26 00:03:39 10:140:11:59:37
key image 03: 6dbbc02ce1cc14147556c81c49b10ea59d0e60766c848c31d91176d8d50c6319 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 737d1cf301456d679a75e17792a9209569b26b0f915dc4530978b712d5096410 00098266 1 26/74 2014-06-23 15:31:49 10:142:20:31:27
key image 04: 4ba2cfa7ccc5540d6b2694789ac1137db02ea1be97cd00c1238102386fe5206a amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d9f0e32be44f1c47b2719ece36be358a8b7c257bb80f8a437f1cfa90f0430c1b 00099669 1 21/67 2014-06-24 14:31:58 10:141:21:31:18
key image 05: 0f6a1c863cfedd63bb9e2448139682a92e1c37377c6a1704c246edd983fecaf7 amount: 0.300000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e6b6e09cc911b6b7d0f7298a594c0c48e497868a27305ffba068dd10d1eedc03 00103182 1 6/40 2014-06-27 02:01:37 10:139:10:01:39
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 775849338, "key_offsets": [ 0 ], "k_image": "ff298cebb23a08d7dcaa66e4e861d0dce46689ffb32e160f8aa6e7d3e3675e3c" } }, { "key": { "amount": 700000000000, "key_offsets": [ 31392 ], "k_image": "1fda4c6396d136fef91a6d52849dca51039fb28b5eeca3081c514bf351731403" } }, { "key": { "amount": 500000000000, "key_offsets": [ 55571 ], "k_image": "1950592acb16e6166aaf0c5cf5e86d405893e1231629d4ad5e3f8552235a9fc5" } }, { "key": { "amount": 500000000000, "key_offsets": [ 47238 ], "k_image": "6dbbc02ce1cc14147556c81c49b10ea59d0e60766c848c31d91176d8d50c6319" } }, { "key": { "amount": 500000000000, "key_offsets": [ 51111 ], "k_image": "4ba2cfa7ccc5540d6b2694789ac1137db02ea1be97cd00c1238102386fe5206a" } }, { "key": { "amount": 300000000000, "key_offsets": [ 63309 ], "k_image": "0f6a1c863cfedd63bb9e2448139682a92e1c37377c6a1704c246edd983fecaf7" } } ], "vout": [ { "amount": 5000000000, "target": { "key": "1967f0349013b1d07c9445b7999eb7cefd2cd32e93168c0faf6bfcada0f43d94" } }, { "amount": 30000000000, "target": { "key": "1745e2618061a5989c187aa32b5d6dca428c3eeb2d9a755cc733564699e19b68" } }, { "amount": 60000000000, "target": { "key": "e50b47c77efe38753f1325ae50b6c144fa1085dfea10f2f6a29e450b112c5dd7" } }, { "amount": 200000000000, "target": { "key": "e29a3e8ac681ed31e6cdd2272c792d44b31af908ea60e86de4404e8e503c49a4" } }, { "amount": 200000000000, "target": { "key": "d51c83ce312f1233980ae13e4a8d706316c0bb03ebb079315a2b21197e94f36a" } }, { "amount": 2000000000000, "target": { "key": "d48bbb733d339e788ae6443c9a37186a5a8104b4da1d52fde909759c5fffa0ce" } } ], "extra": [ 2, 33, 0, 113, 108, 198, 54, 194, 89, 71, 105, 155, 191, 123, 62, 12, 85, 8, 63, 3, 10, 181, 235, 203, 242, 64, 73, 163, 58, 54, 158, 156, 57, 238, 10, 1, 3, 176, 5, 0, 251, 115, 150, 142, 58, 205, 57, 177, 171, 182, 214, 50, 97, 193, 76, 241, 142, 177, 93, 132, 242, 223, 84, 124, 89, 7, 235, 126 ], "signatures": [ "3d68ea20f2da966055c8b3e0f1c4bfe3f430edb3d740af5b0f163833933d3f06be8d7c583c87bcff85de21d8f43be25fed34c740e6706b7ad93d76336412fd0b", "cb2e5997f419ff9ec5c6e489995442ecd70f366b27ebd97180f051e2dd427d0c50fc83edc877710943f52f5909f6ffef7e159043c293b8bf1bf6b7ff948ef507", "edb5659c567693d4ca3f910c10b2c427da4ccaddc699a8278044314c565200078bf6f558a1eda61ae854dd1a8f98258e16a7081ebfcc5c0d30fdf66a9411f003", "c663dd11bb7bf296ad0797e9609960a8b2d3d0394e1dae02dcdfa8e4c1d0310dbae3b7966c606046ff3fcf427926f5c0528d990fc7c248d49dd74fd1e6b95f0f", "2539b62c2adf1a46cfe46d787168577596d52b96c46be18b32347e24721bd801e37df607bc44237b82d786d81bb29b0b8af1220da92060e75f50462049393104", "f53076c14b2efcd2cbc5f0cbae4b25eb27938fdae463f0d1aa3f8fb0da07ad06f1435fa2fb50bb822eabc0a3b07cd051bcf8e630b7888f07866fc224efcbca0f"] }


Less details
source code | moneroexplorer