Monero Transaction 2052559385da69b26be753b4486ec9b98585819cbabbed6546a2824725670e5f

Autorefresh is OFF

Tx hash: 2052559385da69b26be753b4486ec9b98585819cbabbed6546a2824725670e5f

Tx public key: f8614c2ded4420dcf9c4afb27d040b15204951eef1a7685ba4b78ae97429b0ca

Transaction 2052559385da69b26be753b4486ec9b98585819cbabbed6546a2824725670e5f was carried out on the Monero network on 2014-06-12 13:33:03. The transaction has 3205565 confirmations. Total output fee is 0.009510402079 XMR.

Timestamp: 1402579983 Timestamp [UTC]: 2014-06-12 13:33:03 Age [y:d:h:m:s]: 10:166:21:28:37
Block: 82055 Fee (per_kB): 0.009510402079 (0.005147278926) Tx size: 1.8477 kB
Tx version: 1 No of confirmations: 3205565 RingCT/type: no
Extra: 01f8614c2ded4420dcf9c4afb27d040b15204951eef1a7685ba4b78ae97429b0ca

29 output(s) for total of 5.664070000000 xmr

stealth address amount amount idx tag
00: 57870563b35e7bc15872f894948c1f653bd3359e590822508f18cac98c6ee9b5 0.000010000000 34144 of 59775 -
01: f8c9d74ac54b90fc64a5d7594c8f660acbf953c14f2aca0f59b821e7a2ac638b 0.000040000000 33799 of 58748 -
02: c5d662950b1e125290e2c98d05b088a90223890ad3c88f400ece0754e3938c7c 0.000290000000 1519 of 2161 -
03: e7026a5306e12106040b88c74530a4f280759404e3e1d9a292b833a75e39bb48 0.000380000000 1531 of 2221 -
04: b6b9e26029e75ad624b2fbf35db138a56bd23ce3b3cbeb209e54cf588b31f8a9 0.000730000000 1511 of 2195 -
05: bc054c9335e23976128dd4c49487d20c2b947728a317d2c59de46c8a2c47dd47 0.000940000000 1520 of 2159 -
06: 8b007204c5b2685316f39f45f8bf6411094b406357a20085633983a90a23a2d7 0.001310000000 324 of 454 -
07: 453c4e221e34476e6d5a3b5ed8945f5d1a1886e956232dce78ef1247a65f6dd1 0.001920000000 272 of 401 -
08: e183eaa156e12ef331224f907e8f5dc00bdb9f7e647487e69a3b9482f1736374 0.003100000000 260 of 378 -
09: 00c8e3d59e1b9632bc2cde4338cbd684e12494e9a6649bf40a4af21002262c3a 0.004350000000 246 of 353 -
10: 4ac0da78a26351ee0b21376215570e4564d5e9eca575c847763058f22a71d6e6 0.006000000000 92197 of 256624 -
11: 5cc66c88f2385be0bb8bbac82e879a1c4c2931cca397b32222128344f6eae06f 0.006000000000 92198 of 256624 -
12: e31b8852491b41081a1d7f0a7af727e8983ff25a5d182eeb7acd66c70ba4598f 0.009000000000 80633 of 233398 -
13: 2003eab2f3675c023731a65f1b2fe8a64e02c53225b2b58360bfe9aae5d768b3 0.010000000000 171763 of 502466 -
14: b0e025e98eea0d8edb8b6e99a6ef5e7574fd1f27445fb05ce1287b57e3293fb8 0.020000000000 107149 of 381492 -
15: 9b339637592e4b666a7f93f3c65a1a60db621319472015699873e46dd42efb93 0.020000000000 107150 of 381492 -
16: 4763e1caa2318cce23ad4741cf2ba85e882f06d5305e18a3b5c83241bb089b26 0.020000000000 107151 of 381492 -
17: 4ba51d966ad77d6b5427dc44ca614712bbf29c845b4b42352de17fe74e5bbd75 0.030000000000 77921 of 324336 -
18: 5a36ea9b703b26cfd03f58b5e66d730d730222257d73c6c2c6dac62741b25174 0.030000000000 77922 of 324336 -
19: bb30dd7410110f15792fb572d66d7c6806322fecd8977d9bc9ff818b0400ae1e 0.040000000000 63308 of 294095 -
20: 6dd199554904b26f6d8d80ad98af3162f9fc390aaf5046b719ab821a4fc9723c 0.050000000000 53924 of 284521 -
21: cb7d2514a3906404c408dc0f86c607bbf2784940b9e2229a908fce97a8445d77 0.050000000000 53925 of 284521 -
22: 4f8226cafccebb09ea42b9aa550db19392c038fd4136c25fe165cd05ca7df7c8 0.070000000000 42245 of 263947 -
23: 4a36ebc249e0bcf5413e6f96bc7c7224773279f78b4120e325ec21f00616c3a6 0.090000000000 36704 of 317822 -
24: 959074a2e2e58a7604599f5c5fcbeff48a3ea432293b84dab5394f7724588c76 0.100000000000 76017 of 982315 -
25: 3311e9cc51cf7815bd61f36e5b5e41d4ffcfff1bc3a5b9e27e14ea7ecc6df1f4 0.100000000000 76018 of 982315 -
26: a413b476095eb9aec8fd65e84ce92c933686cd2d68c5a26fd77d4581049726e9 0.100000000000 76019 of 982315 -
27: 0d16f3bf1adab3d0dfecf8a3fcabfd331f80db672c549a453856a848b7f2b213 0.900000000000 15857 of 454894 -
28: 6a92229d74966e3ea834e3d642fdcac39c76e3e7fe07f6fba5311d43f92ed597 4.000000000000 6876 of 237197 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



7 inputs(s) for total of 5.673580402079 xmr

key image 00: c06451a649e8812f6cb17875252f0efd8d987f25234d41229b77babe3526f8a1 amount: 0.000580402079
ring members blk
- 00: d082caafc9ada1989094832f293d2d6bc6cb2f4d184c0bb47ed719814cf51488 00081228
key image 01: 39195356d966834c28ef9b31a98be6d311115e6344bc4341942c579bf74e4211 amount: 0.007000000000
ring members blk
- 00: 509d094986b68848a1c83e2dcd6a04cc34e4b8c4fe0f84c210b826e4edd5d10e 00081893
key image 02: f448c5d0fb134866912bbfed2e43a73dbc54e08f2066a8716d27f65f827ef2b9 amount: 0.060000000000
ring members blk
- 00: a5df7097b2e97329a94af4759e17103a1d791ca57127dead6c6ae6cc7878c112 00081280
key image 03: 5f5389dc4cba77309cc9427f962b75f35f796f999472c5803461043a0e8491b5 amount: 0.300000000000
ring members blk
- 00: 4e29e83a966f9300ede282ec7e27afe3c17115c13a9ea8a693c64ebae057c851 00081926
key image 04: cab3a4853aefca1f1751e18c1e465f6bcf8356d3bd5c44c822b9f761f36b720a amount: 0.300000000000
ring members blk
- 00: fdad8cb6a01f898831ad5a2ddb5f83af9f6aa05ca23c6221b139983adae5fa24 00081240
key image 05: 048490e0f7a97b503b176d3339dad960f10e1ec0f97d37df27de02a7bd0f9eee amount: 0.006000000000
ring members blk
- 00: 060f8d95b86ba3a86f2018afc016c1cd707f905c91139f046443486b139a9668 00081961
key image 06: 94dc5296f1d41c65501df8050387bbd4ea73fa0ab7b3f77f92e1819053406424 amount: 5.000000000000
ring members blk
- 00: 968d5349b1fe3e87ca3b3b4bdffb8bdf5d6cecc6ce4710a7e078a632b0c15cd5 00081960
More details
source code | moneroexplorer