Monero Transaction 58ba86e34ce4a2d958a8debdf9134fdfa72003cfac0db7db8015d4afd421445d

Autorefresh is OFF

Tx hash: 58ba86e34ce4a2d958a8debdf9134fdfa72003cfac0db7db8015d4afd421445d

Tx prefix hash: 86f5d9ba46728372cd00a0a48b9a8a7f04badd508825c778e739831a2d541539
Tx public key: 026cc83168bc2501ef902a0601bbe807b81c68ea37befe08df76176b205235ed
Payment id: 18cd90610f45e37c1fdbb8e5cb633ede5aba101a17e25a8388db38c73a227927

Transaction 58ba86e34ce4a2d958a8debdf9134fdfa72003cfac0db7db8015d4afd421445d was carried out on the Monero network on 2014-07-16 00:18:22. The transaction has 3112197 confirmations. Total output fee is 0.005000000000 XMR.

Timestamp: 1405469902 Timestamp [UTC]: 2014-07-16 00:18:22 Age [y:d:h:m:s]: 10:070:22:28:23
Block: 130436 Fee (per_kB): 0.005000000000 (0.015753846154) Tx size: 0.3174 kB
Tx version: 1 No of confirmations: 3112197 RingCT/type: no
Extra: 02210018cd90610f45e37c1fdbb8e5cb633ede5aba101a17e25a8388db38c73a22792701026cc83168bc2501ef902a0601bbe807b81c68ea37befe08df76176b205235ed

1 output(s) for total of 0.100000000000 xmr

stealth address amount amount idx tag
00: 2c63b562722c8b60c77e938eeaadc4122bff9a860c98d3a83cca07fd9e97ea0f 0.100000000000 280380 of 982315 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-12 13:15:28 till 2014-07-15 23:22:47; resolution: 0.20 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 0.105000000000 xmr

key image 00: 285e359a4fdd0fbc5f3b51a720c57ed06c592a89c281ed3ac0df5c18998b0189 amount: 0.005000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0690dd5163eb069e29f34d15e8c82b93897952406bbd5900688a33a5af4c8490 00082101 1 9/145 2014-06-12 14:15:28 10:104:08:31:17
key image 01: 542320ffd1ed305ea948aa4e24513f3419623c3f156c662d7301c2eef993c1aa amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 51d2d0f27013bc7944b5dfce7fe6de9332bfeeaaa10bab06592635520b146858 00130294 1 4/4 2014-07-15 22:22:47 10:071:00:23:58
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000, "key_offsets": [ 98426 ], "k_image": "285e359a4fdd0fbc5f3b51a720c57ed06c592a89c281ed3ac0df5c18998b0189" } }, { "key": { "amount": 100000000000, "key_offsets": [ 279924 ], "k_image": "542320ffd1ed305ea948aa4e24513f3419623c3f156c662d7301c2eef993c1aa" } } ], "vout": [ { "amount": 100000000000, "target": { "key": "2c63b562722c8b60c77e938eeaadc4122bff9a860c98d3a83cca07fd9e97ea0f" } } ], "extra": [ 2, 33, 0, 24, 205, 144, 97, 15, 69, 227, 124, 31, 219, 184, 229, 203, 99, 62, 222, 90, 186, 16, 26, 23, 226, 90, 131, 136, 219, 56, 199, 58, 34, 121, 39, 1, 2, 108, 200, 49, 104, 188, 37, 1, 239, 144, 42, 6, 1, 187, 232, 7, 184, 28, 104, 234, 55, 190, 254, 8, 223, 118, 23, 107, 32, 82, 53, 237 ], "signatures": [ "2b7ad5cd5b182a4a14b7be07e4b3acc7e06bf78ffe0b27079e6f504448a9c90f0fee537830f9b1348039642a1aae285e17d834b1235d8eff4e1e5acb0cd05703", "3fbb07fbf37d657c6328356e3138c213b237aa2bdb22383aefbd0c000b6a400fa4fdce6bcb15eb65e9f2ae9647324dd6373e9f8d9b76c6606ff23d4c0f3d3e0b"] }


Less details
source code | moneroexplorer