Monero Transaction 258466307c19bece7f5cae6d27ce46028c78f1b8cf8442f5aa11fec14f970e8a

Autorefresh is OFF

Tx hash: 258466307c19bece7f5cae6d27ce46028c78f1b8cf8442f5aa11fec14f970e8a

Tx prefix hash: 9b4a6e37c8ba2c6ed29153260ab00c146eaae1496f7f1bd0902b5d278ed92a9a
Tx public key: db2e0d7cad10acce4c55d63f5af742e2442fbb6bc637a8574042f719a7c1d18b
Payment id: 4d3b863c479ccd800ed6e65a59edb9ae4c41458d06b157a7acd6c2177a634440

Transaction 258466307c19bece7f5cae6d27ce46028c78f1b8cf8442f5aa11fec14f970e8a was carried out on the Monero network on 2014-07-31 12:26:17. The transaction has 3175665 confirmations. Total output fee is 0.005137030000 XMR.

Timestamp: 1406809577 Timestamp [UTC]: 2014-07-31 12:26:17 Age [y:d:h:m:s]: 10:174:19:25:58
Block: 152903 Fee (per_kB): 0.005137030000 (0.014140641720) Tx size: 0.3633 kB
Tx version: 1 No of confirmations: 3175665 RingCT/type: no
Extra: 0221004d3b863c479ccd800ed6e65a59edb9ae4c41458d06b157a7acd6c2177a63444001db2e0d7cad10acce4c55d63f5af742e2442fbb6bc637a8574042f719a7c1d18b

5 output(s) for total of 0.194862970000 xmr

stealth address amount amount idx tag
00: 456f565ccd2c67b34964cce10685742ea49d5fcb7413ed1c0fde6931da541897 0.000862970000 0 of 2 -
01: b9bb62d6f246ecc4a07b81faa675c45df69e2ee05c39527a24af7135c217dcab 0.006000000000 176696 of 256624 -
02: 8cfa7e22bca1812cff5b016dd947af23ef378340bdf47e88f096f5bd43c40d3f 0.008000000000 160675 of 245068 -
03: 6048dfd5ee27f287bcb0e0dcd1e3efcbc0fafac553e1905a6c68e6727d25f11a 0.080000000000 85188 of 269576 -
04: 2f140ba5c7d0dea6ef5bb6bab5e3d08a754ba2c6aab5ea2b75d4dff49b6dd35f 0.100000000000 347396 of 982315 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-22 12:13:54 till 2014-07-22 14:13:54; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|

1 inputs(s) for total of 0.200000000000 xmr

key image 00: 03404487e6ad63849335cbf58bf0ccc5756087f013971e485f73658dc0ce9c90 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3a28a8257a8a4aa7905633c29c138ec55ff31926376ef1f8d0dd77eaac3858c1 00139999 1 2/5 2014-07-22 13:13:54 10:183:18:38:21
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 200000000000, "key_offsets": [ 239444 ], "k_image": "03404487e6ad63849335cbf58bf0ccc5756087f013971e485f73658dc0ce9c90" } } ], "vout": [ { "amount": 862970000, "target": { "key": "456f565ccd2c67b34964cce10685742ea49d5fcb7413ed1c0fde6931da541897" } }, { "amount": 6000000000, "target": { "key": "b9bb62d6f246ecc4a07b81faa675c45df69e2ee05c39527a24af7135c217dcab" } }, { "amount": 8000000000, "target": { "key": "8cfa7e22bca1812cff5b016dd947af23ef378340bdf47e88f096f5bd43c40d3f" } }, { "amount": 80000000000, "target": { "key": "6048dfd5ee27f287bcb0e0dcd1e3efcbc0fafac553e1905a6c68e6727d25f11a" } }, { "amount": 100000000000, "target": { "key": "2f140ba5c7d0dea6ef5bb6bab5e3d08a754ba2c6aab5ea2b75d4dff49b6dd35f" } } ], "extra": [ 2, 33, 0, 77, 59, 134, 60, 71, 156, 205, 128, 14, 214, 230, 90, 89, 237, 185, 174, 76, 65, 69, 141, 6, 177, 87, 167, 172, 214, 194, 23, 122, 99, 68, 64, 1, 219, 46, 13, 124, 173, 16, 172, 206, 76, 85, 214, 63, 90, 247, 66, 226, 68, 47, 187, 107, 198, 55, 168, 87, 64, 66, 247, 25, 167, 193, 209, 139 ], "signatures": [ "550bda6b4b3af392d73d12cf828b40350e0b305db012001eb1452e614339b8019aab2db7bb83ef24be1e8356a42776f869467db641115eb2213955b2736ed301"] }


Less details
source code | moneroexplorer