Monero Transaction 58f027844ddf7384fcae09f6e306f650d0de5b68c4cf03260c3910a5b83a4f5d

Autorefresh is OFF

Tx hash: 58f027844ddf7384fcae09f6e306f650d0de5b68c4cf03260c3910a5b83a4f5d

Tx prefix hash: e5e8da6baefd86f34b865173c8ea040b353efa98db35312fd61fe212b16d178e
Tx public key: a4e7c24902b2dd3c465a9b463cf3b1d7c54f5129e4b3fc6af23c4005f1487479
Payment id: 8c425bf17ee59491a3c123eb2ac857cb1418ef36a446c4b6427e76c85a89333b

Transaction 58f027844ddf7384fcae09f6e306f650d0de5b68c4cf03260c3910a5b83a4f5d was carried out on the Monero network on 2014-10-28 15:28:36. The transaction has 3010898 confirmations. Total output fee is 0.175972540000 XMR.

Timestamp: 1414510116 Timestamp [UTC]: 2014-10-28 15:28:36 Age [y:d:h:m:s]: 10:034:02:00:05
Block: 280529 Fee (per_kB): 0.175972540000 (0.204303719909) Tx size: 0.8613 kB
Tx version: 1 No of confirmations: 3010898 RingCT/type: no
Extra: 0221008c425bf17ee59491a3c123eb2ac857cb1418ef36a446c4b6427e76c85a89333b01a4e7c24902b2dd3c465a9b463cf3b1d7c54f5129e4b3fc6af23c4005f1487479

7 output(s) for total of 94.824713380000 xmr

stealth address amount amount idx tag
00: 755c14ece6011acafd91130e3e7dfef87824aa9438593411e6db2327466ba2a9 0.024713380000 0 of 1 -
01: 03b9982f7a1353e8e8346cbfe0cd58a2ab4fd0dad66e2db6ab54966a6b9a3f7f 0.900000000000 151959 of 454894 -
02: 247707ee7f584e8ee64cbc369dd21424759fb870ffce21a944ec3db6a8c4c078 0.900000000000 151960 of 454894 -
03: 1f16aa2a25a146e714c052cdf704bc746cee1f5fc65fa7449d121118db630815 5.000000000000 120762 of 255089 -
04: f05ec7fbe03eae8ba7812e5885ee232eac9f354a7dc4d6c1f700ae6688f984a7 8.000000000000 22366 of 226902 -
05: 889fd02aa3fb6523e1c770a7c9e0f8da4aa2c408301874fc0333b2a22c4926c9 20.000000000000 18767 of 78991 -
06: 3b776416f2aea71d18d2d766b8ab8935448f93fb5c4c5015dbd6d4d7dce88c20 60.000000000000 3411 of 26317 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-08-18 14:04:22 till 2014-10-28 10:17:44; resolution: 0.42 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_____________________________________________________________________________________________________________________________________________________________*____________|
  • |________________________________________________________________________________________________________________________________________________________________*_________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|

5 inputs(s) for total of 95.000685920000 xmr

key image 00: 50d06d7b8651fb57ea0e154b0eda5786e8550a46949495fa37b6f2235a403f29 amount: 0.000685920000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 07da78924046efa0f87d976a363f90da2389480b3a871d6cbdb837542e17b5f3 00178877 2 2/8 2014-08-18 15:04:22 10:105:02:24:19
key image 01: a4639e88a385194bf221256ff1cfec94efc0604ad7c09b1b86d6b0e62665a432 amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e41343a041bae05ce6ffa05470f503f4efa58377a4ce5b44040d13f742648c26 00280131 1 89/1 2014-10-28 09:17:44 10:034:08:10:57
key image 02: 4b8171f2ecb2fd72d268228484e281c5f3f683a42a8923b04183b64982722905 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 79990b2af0948e66429363b98c4edbc44e65b701d122cb79c6d357bef27d7a4b 00272941 1 3/3 2014-10-23 07:27:31 10:039:10:01:10
key image 03: ded2e50730147d475579aea55700c7201919309ff07b218010c36d233f5fc02c amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 79ea2205801829a7edb982ba5618e12e5c93f40fc92848ce7b867cf6bf11e327 00274836 1 3/5 2014-10-24 14:14:35 10:038:03:14:06
key image 04: 7f4cf9911642c61eed5b21a81dd0a320de03c08c85de6d0223c5ac40ddcf692f amount: 80.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b0c1dc6cfb9022662e0a791ff72b711b9475bb19b28bc21347147faeea6f8e8d 00279784 1 33/7 2014-10-28 04:19:07 10:034:13:09:34
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 685920000, "key_offsets": [ 0 ], "k_image": "50d06d7b8651fb57ea0e154b0eda5786e8550a46949495fa37b6f2235a403f29" } }, { "key": { "amount": 1000000000000, "key_offsets": [ 318940 ], "k_image": "a4639e88a385194bf221256ff1cfec94efc0604ad7c09b1b86d6b0e62665a432" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 317813 ], "k_image": "4b8171f2ecb2fd72d268228484e281c5f3f683a42a8923b04183b64982722905" } }, { "key": { "amount": 4000000000000, "key_offsets": [ 127272 ], "k_image": "ded2e50730147d475579aea55700c7201919309ff07b218010c36d233f5fc02c" } }, { "key": { "amount": 80000000000000, "key_offsets": [ 2850 ], "k_image": "7f4cf9911642c61eed5b21a81dd0a320de03c08c85de6d0223c5ac40ddcf692f" } } ], "vout": [ { "amount": 24713380000, "target": { "key": "755c14ece6011acafd91130e3e7dfef87824aa9438593411e6db2327466ba2a9" } }, { "amount": 900000000000, "target": { "key": "03b9982f7a1353e8e8346cbfe0cd58a2ab4fd0dad66e2db6ab54966a6b9a3f7f" } }, { "amount": 900000000000, "target": { "key": "247707ee7f584e8ee64cbc369dd21424759fb870ffce21a944ec3db6a8c4c078" } }, { "amount": 5000000000000, "target": { "key": "1f16aa2a25a146e714c052cdf704bc746cee1f5fc65fa7449d121118db630815" } }, { "amount": 8000000000000, "target": { "key": "f05ec7fbe03eae8ba7812e5885ee232eac9f354a7dc4d6c1f700ae6688f984a7" } }, { "amount": 20000000000000, "target": { "key": "889fd02aa3fb6523e1c770a7c9e0f8da4aa2c408301874fc0333b2a22c4926c9" } }, { "amount": 60000000000000, "target": { "key": "3b776416f2aea71d18d2d766b8ab8935448f93fb5c4c5015dbd6d4d7dce88c20" } } ], "extra": [ 2, 33, 0, 140, 66, 91, 241, 126, 229, 148, 145, 163, 193, 35, 235, 42, 200, 87, 203, 20, 24, 239, 54, 164, 70, 196, 182, 66, 126, 118, 200, 90, 137, 51, 59, 1, 164, 231, 194, 73, 2, 178, 221, 60, 70, 90, 155, 70, 60, 243, 177, 215, 197, 79, 81, 41, 228, 179, 252, 106, 242, 60, 64, 5, 241, 72, 116, 121 ], "signatures": [ "368b21a433673fde9e53f7ce01fe30e368c56796c063218f043f4f68bfcad6026f09e744770acf0e350d4c2168c135beeef36601e852c4811f32fde81aa4080f", "00a408c68d954ddaa92a2aee32cae8a2a59bb91fa5c11786746b7b81c557700720c921215bff00ae46d4b45a2f9b563dff0b45b11f234943b3eb23043cb9b70b", "276f14279ebe24565f7776b7244f2bc4df50bb725122a98784e131a60bcce70ddc36265ada1e304098a4c3643f2b3dc0eeebf22ea203138d56765bb449322109", "32e4c75b2468d02b362e0f282fde64878fcb1e9e4fba7d0ddc357073ae233e0ef44ae087d28c23fcb1f965d4c39ea34b56ec60b963594e623530e97e1b5a2601", "0f1b4c2e7a956b2b4179eaca329f9ee4fa31ea7117090da3fefa97672b45720cfd3c38a23f2b40da016b3de3147016a8d3c1aa62ba29c1c3ba879ab8653af70f"] }


Less details
source code | moneroexplorer