Monero Transaction 58b80dad4d6a6da66690c21c3d06e8378946a4363e0167809ed447064b1f1f71

Autorefresh is OFF

Tx hash: 58b80dad4d6a6da66690c21c3d06e8378946a4363e0167809ed447064b1f1f71

Tx prefix hash: 341a22f02967cbb21deeabef6c04ccb73b6fbafd1358f025d720f5eb67e80fd0
Tx public key: 0991ef95a5fbb1d426c6edf720651e2f19fc87973c0de067e72f72784f4204b0
Payment id: 78974353db254e048e172f71bf449e436415e7e1e29048b39de2cc860a677131

Transaction 58b80dad4d6a6da66690c21c3d06e8378946a4363e0167809ed447064b1f1f71 was carried out on the Monero network on 2016-12-19 07:36:37. The transaction has 2109326 confirmations. Total output fee is 0.004000000000 XMR.

Timestamp: 1482132997 Timestamp [UTC]: 2016-12-19 07:36:37 Age [y:d:h:m:s]: 08:012:17:21:27
Block: 1204626 Fee (per_kB): 0.004000000000 (0.003447811448) Tx size: 1.1602 kB
Tx version: 1 No of confirmations: 2109326 RingCT/type: no
Extra: 02210078974353db254e048e172f71bf449e436415e7e1e29048b39de2cc860a677131010991ef95a5fbb1d426c6edf720651e2f19fc87973c0de067e72f72784f4204b0

5 output(s) for total of 1.996000000000 xmr

stealth address amount amount idx tag
00: 4cf2ccc211a732e0750ad356a41d7eb0519f699f668c8e224ca5ad6b48ff84fe 0.002000000000 82549 of 95916 -
01: af2296d660411b938f02aa36e44b9a1d336af483d016d2c761408931c3f7fcc1 0.004000000000 74818 of 89181 -
02: be6ce702c0b25d536933c532df19a7537467759b98cad20f35a1a63423e5546f 0.090000000000 295238 of 317822 -
03: 050186e48b5227435bd8ce12b72e15f0461774078df185efa3b09034f7dbb1cc 0.900000000000 436737 of 454894 -
04: 252ccc50dddee0421a4ddf2d6e3d0f4f5c202a941da95d43377ed2cb9ea93948 1.000000000000 849441 of 874630 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-13 04:42:47 till 2016-12-19 06:43:01; resolution: 5.24 days)

  • |_*________________________________________________________________________________________________________________________________________________________*__*___________*|
  • |_____________*____________**_____________________________________________________________________________________________________________________________________________*|
  • |___*_______________*__________________________________________________________________________________________________________________________________________*__________*|

3 inputs(s) for total of 2.000000000000 xmr

key image 00: 0a577238c70d28a70f822646e965baf68f7d0fdd060bd8492aafacc85125f411 amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 57f937999f9893c92f63f3aaa1c12b29fb26638a675ded55c98578fe2ed79119 00126458 1 1/17 2014-07-13 05:42:47 10:172:19:15:17
- 01: 2c1be1d5c01e4e476a9857849cef137a99a84d31aa8339c191f9c522f549eb2c 01145834 3 12/40 2016-09-28 14:15:00 08:094:10:43:04
- 02: 1e15c062fb22cb18a2497f346c0a827381e9bd749b33b8bba29c28a9b2ef89ff 01156098 5 3/4 2016-10-12 20:44:54 08:080:04:13:10
- 03: 49fa20d08fd6047ce8174878d1baf3d49226d78e7069cc3cd05dd6c7100a17ad 01204362 3 124/112 2016-12-18 21:12:12 08:013:03:45:52
key image 01: e794e810dc293bff513536138f5f90810878fed58c664ce2f62e5b8294e4ca3a amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 69f90d4635d63e620e5eafd2958b3de120209880e0d010b8700e284a64a8ba90 00218593 3 26/139 2014-09-15 07:01:29 10:108:17:56:35
- 01: 5bf6c93d6ea9d56df2fd8b214c511f43f1d98b110af2508b5aa6646ba741e1be 00320390 1 85/191 2014-11-25 13:51:28 10:037:11:06:36
- 02: e89748d1c0a1484b8033a65fb9f5696baecd43e65ddd9f08041e7c43cf1b721a 00324021 1 16/53 2014-11-28 04:08:20 10:034:20:49:44
- 03: c46534981905657535aa694fc751d8db99ea7f87b2782026cf398311f7021cf8 01204362 3 124/112 2016-12-18 21:12:12 08:013:03:45:52
key image 02: 69d5f5ff015d9bf40af9790c764e5b5cef79984c628c9adc296cd2cf64ed153b amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 22b7c6482c5275af2b2606362596fbbef80f565b4e5a042497ea8f0da336d70e 00146050 4 17/57 2014-07-26 18:19:12 10:159:06:38:52
- 01: 7b3bdd73657f14a8be6687364a9be15c71cdcf36d32b29bff3776d6212fb8db3 00264129 0 0/4 2014-10-17 04:37:16 10:076:20:20:48
- 02: 0c85a3a37212bbd759a119a1af73a60f4f989bd03408ff56324bca1a0b9382df 01160120 3 22/18 2016-10-18 11:07:51 08:074:13:50:13
- 03: 0a46eb99e2c19695782893eacab0bcf9bf614898d7681d598b8479e0d5b99cb6 01204563 3 100/92 2016-12-19 05:43:01 08:012:19:15:03
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 100000000000, "key_offsets": [ 270653, 651346, 5923, 29904 ], "k_image": "0a577238c70d28a70f822646e965baf68f7d0fdd060bd8492aafacc85125f411" } }, { "key": { "amount": 1000000000000, "key_offsets": [ 260348, 87451, 2788, 498613 ], "k_image": "e794e810dc293bff513536138f5f90810878fed58c664ce2f62e5b8294e4ca3a" } }, { "key": { "amount": 900000000000, "key_offsets": [ 66347, 80075, 263396, 26877 ], "k_image": "69d5f5ff015d9bf40af9790c764e5b5cef79984c628c9adc296cd2cf64ed153b" } } ], "vout": [ { "amount": 2000000000, "target": { "key": "4cf2ccc211a732e0750ad356a41d7eb0519f699f668c8e224ca5ad6b48ff84fe" } }, { "amount": 4000000000, "target": { "key": "af2296d660411b938f02aa36e44b9a1d336af483d016d2c761408931c3f7fcc1" } }, { "amount": 90000000000, "target": { "key": "be6ce702c0b25d536933c532df19a7537467759b98cad20f35a1a63423e5546f" } }, { "amount": 900000000000, "target": { "key": "050186e48b5227435bd8ce12b72e15f0461774078df185efa3b09034f7dbb1cc" } }, { "amount": 1000000000000, "target": { "key": "252ccc50dddee0421a4ddf2d6e3d0f4f5c202a941da95d43377ed2cb9ea93948" } } ], "extra": [ 2, 33, 0, 120, 151, 67, 83, 219, 37, 78, 4, 142, 23, 47, 113, 191, 68, 158, 67, 100, 21, 231, 225, 226, 144, 72, 179, 157, 226, 204, 134, 10, 103, 113, 49, 1, 9, 145, 239, 149, 165, 251, 177, 212, 38, 198, 237, 247, 32, 101, 30, 47, 25, 252, 135, 151, 60, 13, 224, 103, 231, 47, 114, 120, 79, 66, 4, 176 ], "signatures": [ "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", "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", "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"] }


Less details
source code | moneroexplorer