Monero Transaction 58ad0aaa16089993b83959cdaec774a06e40b3a67506fd52f37c1138ece6d831

Autorefresh is OFF

Tx hash: 58ad0aaa16089993b83959cdaec774a06e40b3a67506fd52f37c1138ece6d831

Tx prefix hash: c1f1c8c251a26fafa702e7a4f2909da813457bb276072e9e18533d9f4ac61472
Tx public key: 20375bae6f912a40753cebc3bbe8070b56f964ac65abba7b24396fb39fd43d80
Payment id: ae38261d63f9f2e581cffae63be6a672b7a8cbfbf2fed69b3d248b405b50c4fb

Transaction 58ad0aaa16089993b83959cdaec774a06e40b3a67506fd52f37c1138ece6d831 was carried out on the Monero network on 2014-11-29 06:33:58. The transaction has 2979855 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1417242838 Timestamp [UTC]: 2014-11-29 06:33:58 Age [y:d:h:m:s]: 10:022:00:27:58
Block: 325619 Fee (per_kB): 0.010000000000 (0.027161803714) Tx size: 0.3682 kB
Tx version: 1 No of confirmations: 2979855 RingCT/type: no
Extra: 022100ae38261d63f9f2e581cffae63be6a672b7a8cbfbf2fed69b3d248b405b50c4fb0120375bae6f912a40753cebc3bbe8070b56f964ac65abba7b24396fb39fd43d80

5 output(s) for total of 9.990000000000 xmr

stealth address amount amount idx tag
00: b1fecf245e7fd2174c5172db9cd0a49cd87584da7c0aab3b0bade0a3b57e4239 0.090000000000 124594 of 317822 -
01: cbc9f457a84903ece439f1f080fc91d64574a63d18d794b70c4f9af2755df14e 0.400000000000 289406 of 688584 -
02: 31b93f38544a34b9a2b2d82c0fbc50afe8c2a0fdff3c46a52a96dfa6b92be8cf 0.500000000000 488656 of 1118624 -
03: d32d1035c59729717a4347e383af94e0bd9e22d0bb6bd51a183c1f98b11ac581 4.000000000000 134297 of 237197 -
04: 36a535004bf908920226b946782c12915488b01ed031f8aafa993f6b279b646d 5.000000000000 128605 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-11-29 00:19:21 till 2014-11-29 02:19:21; resolution: 0.00 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|

1 inputs(s) for total of 10.000000000000 xmr

key image 00: 59909f2592893fca2c3a77d49d12bb1294f35d1c4bbf1889552bee5af498d890 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 592c4b99574d58a75a41fd68b2127a0612082bd99517875c3e56b015094d66b7 00325305 1 4/4 2014-11-29 01:19:21 10:022:05:42:35
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 10000000000000, "key_offsets": [ 377949 ], "k_image": "59909f2592893fca2c3a77d49d12bb1294f35d1c4bbf1889552bee5af498d890" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "b1fecf245e7fd2174c5172db9cd0a49cd87584da7c0aab3b0bade0a3b57e4239" } }, { "amount": 400000000000, "target": { "key": "cbc9f457a84903ece439f1f080fc91d64574a63d18d794b70c4f9af2755df14e" } }, { "amount": 500000000000, "target": { "key": "31b93f38544a34b9a2b2d82c0fbc50afe8c2a0fdff3c46a52a96dfa6b92be8cf" } }, { "amount": 4000000000000, "target": { "key": "d32d1035c59729717a4347e383af94e0bd9e22d0bb6bd51a183c1f98b11ac581" } }, { "amount": 5000000000000, "target": { "key": "36a535004bf908920226b946782c12915488b01ed031f8aafa993f6b279b646d" } } ], "extra": [ 2, 33, 0, 174, 56, 38, 29, 99, 249, 242, 229, 129, 207, 250, 230, 59, 230, 166, 114, 183, 168, 203, 251, 242, 254, 214, 155, 61, 36, 139, 64, 91, 80, 196, 251, 1, 32, 55, 91, 174, 111, 145, 42, 64, 117, 60, 235, 195, 187, 232, 7, 11, 86, 249, 100, 172, 101, 171, 186, 123, 36, 57, 111, 179, 159, 212, 61, 128 ], "signatures": [ "1a2c1149f139c55892348fe77c995ae705792d7668b1fff59333325256109907664bbf0651e334eda3b4d010957e61cba6a6b47c30bf3b9133d6c3183b9d8f03"] }


Less details
source code | moneroexplorer