Monero Transaction 52b84e917a6f7944bfc9c4a0a5ff7e83f761f9aecd877712511e245077002070

Autorefresh is OFF

Tx hash: 52b84e917a6f7944bfc9c4a0a5ff7e83f761f9aecd877712511e245077002070

Tx prefix hash: 8c4fc65f7393206ba282c00f2f34df9c71caecb35cb2b7db3723c0f63e3fd6fe
Tx public key: f00faed7e77b3a63604f8530f87e84fa8524048ac1cd82fc1fbd6377fd7e5804
Payment id: fdf80cf8dc413b52b7acfcca7ca55043426676a10e5a51e61c43dd663c250517

Transaction 52b84e917a6f7944bfc9c4a0a5ff7e83f761f9aecd877712511e245077002070 was carried out on the Monero network on 2014-08-04 10:41:14. The transaction has 3142727 confirmations. Total output fee is 0.005875000000 XMR.

Timestamp: 1407148874 Timestamp [UTC]: 2014-08-04 10:41:14 Age [y:d:h:m:s]: 10:133:00:38:01
Block: 158551 Fee (per_kB): 0.005875000000 (0.005390681004) Tx size: 1.0898 kB
Tx version: 1 No of confirmations: 3142727 RingCT/type: no
Extra: 022100fdf80cf8dc413b52b7acfcca7ca55043426676a10e5a51e61c43dd663c25051701f00faed7e77b3a63604f8530f87e84fa8524048ac1cd82fc1fbd6377fd7e5804

9 output(s) for total of 5.234125000000 xmr

stealth address amount amount idx tag
00: 4630195dd41e20cd8b0f65b4f8201b82a96a8ad3e96fe9ccd01e7d1fc949144e 0.000125000000 0 of 1 -
01: 81b5e2832f84f577091a597772c2f876e42a861c16080b60126236a00c5fd91e 0.005000000000 202249 of 308585 -
02: 7e10e33b6e59a6792a73b4a98593191e133132bde9f40673823d7fbb278e0817 0.009000000000 157064 of 233398 -
03: 45e377562464a9a09f640cdad8353b9c92fb51af6b1e362d676f87e803f4804b 0.050000000000 113722 of 284522 -
04: 223f9358a88b10a42f5cc47c1293d828a86a25af88a74eae1636c0dbb2f3fd47 0.070000000000 91768 of 263947 -
05: 0ec2e8c28276777ab84d39ea41ee2241f87cbe23616010efc5bdcfb4ebd003c6 0.500000000000 195942 of 1118624 -
06: 0da94c449501fd1569445d113322f72cbd7e8fd5b6ff0af416df48c647b604fc 0.600000000000 129663 of 650760 -
07: 3e25587b679c429e8de771baef792d139539cbb730533583ae78789b9314de61 1.000000000000 164613 of 874630 -
08: 66d2a17d0226b98a1ff85ebfc1655468c5fdb4d1928bcdb34967791dcd75c0aa 3.000000000000 40291 of 300495 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-17 09:11:55 till 2014-08-04 11:23:07; resolution: 0.47 days)

  • |__________________________________________________________*______________________________________________________________________________________________________________*|
  • |_______________________________________________________________*_________________________________________________________________________________________________________*|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |_______________________________________________________________________________________________________________________________________*_________________________________*|

4 inputs(s) for total of 5.240000000000 xmr

key image 00: 78efad1c425fdd44599c99296f027242b9bb6e1b8ee9cab78e7b52b67243d959 amount: 0.070000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 68e598c9a3abf36f194b61350f6afd370f1bf7048b58ed1be2b3894d855512a6 00083412 1 10/110 2014-06-13 11:48:45 10:184:23:30:30
- 01: fa0be40f00e0827a2644e2054c57ef16ededead7d42c554c3547ce7681146b89 00158539 2 1/8 2014-08-04 10:23:07 10:133:00:56:08
key image 01: 12bb722a90a6761c0388ccc6dbd7bbc111c5980c6554f5ff05450c9cc2fbf370 amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: abf114dc1723e9f450473189b752439a49dc9853cea8724c6dd463b0721dedb9 00086579 1 4/108 2014-06-15 14:59:08 10:182:20:20:07
- 01: cf6d44e11263fecdae3aeef8be16fa2fd07627646f90d7613aed8d7587912602 00158455 0 0/6 2014-08-04 08:51:47 10:133:02:27:28
key image 02: 794a1aa69430aaa2914f327ad86e01e2277ea58de32f356f73f7efcd4a46b962 amount: 0.070000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ae66be4d06259a7570c2b53e9411d3508ead8fbc151417a2c5e063d8047c6d3c 00043762 0 0/9 2014-05-17 10:11:55 10:212:01:07:20
- 01: bde444d24ecf19623844bca04e6a26f53c3aa3e29a8884d32f8941e95cad4e91 00158517 2 5/5 2014-08-04 09:58:44 10:133:01:20:31
key image 03: 452db621d93ea738a21f5cbe6e69b1014fe8358ad6c8b8667c5c7947f494c2a0 amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 61a44636fc713081bad404a8ab8ea1063ee95d8bab0587d7a350f3efaf4e3678 00135554 0 0/5 2014-07-19 12:00:48 10:148:23:18:27
- 01: 2e18fc4c27d5a741c2a6d34fabe8c103ffe8063b9409c7619e5909a3e01e3af4 00158482 0 0/6 2014-08-04 09:15:27 10:133:02:03:48
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 70000000000, "key_offsets": [ 46549, 45217 ], "k_image": "78efad1c425fdd44599c99296f027242b9bb6e1b8ee9cab78e7b52b67243d959" } }, { "key": { "amount": 100000000000, "key_offsets": [ 101193, 267739 ], "k_image": "12bb722a90a6761c0388ccc6dbd7bbc111c5980c6554f5ff05450c9cc2fbf370" } }, { "key": { "amount": 70000000000, "key_offsets": [ 4566, 87193 ], "k_image": "794a1aa69430aaa2914f327ad86e01e2277ea58de32f356f73f7efcd4a46b962" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 60666, 27852 ], "k_image": "452db621d93ea738a21f5cbe6e69b1014fe8358ad6c8b8667c5c7947f494c2a0" } } ], "vout": [ { "amount": 125000000, "target": { "key": "4630195dd41e20cd8b0f65b4f8201b82a96a8ad3e96fe9ccd01e7d1fc949144e" } }, { "amount": 5000000000, "target": { "key": "81b5e2832f84f577091a597772c2f876e42a861c16080b60126236a00c5fd91e" } }, { "amount": 9000000000, "target": { "key": "7e10e33b6e59a6792a73b4a98593191e133132bde9f40673823d7fbb278e0817" } }, { "amount": 50000000000, "target": { "key": "45e377562464a9a09f640cdad8353b9c92fb51af6b1e362d676f87e803f4804b" } }, { "amount": 70000000000, "target": { "key": "223f9358a88b10a42f5cc47c1293d828a86a25af88a74eae1636c0dbb2f3fd47" } }, { "amount": 500000000000, "target": { "key": "0ec2e8c28276777ab84d39ea41ee2241f87cbe23616010efc5bdcfb4ebd003c6" } }, { "amount": 600000000000, "target": { "key": "0da94c449501fd1569445d113322f72cbd7e8fd5b6ff0af416df48c647b604fc" } }, { "amount": 1000000000000, "target": { "key": "3e25587b679c429e8de771baef792d139539cbb730533583ae78789b9314de61" } }, { "amount": 3000000000000, "target": { "key": "66d2a17d0226b98a1ff85ebfc1655468c5fdb4d1928bcdb34967791dcd75c0aa" } } ], "extra": [ 2, 33, 0, 253, 248, 12, 248, 220, 65, 59, 82, 183, 172, 252, 202, 124, 165, 80, 67, 66, 102, 118, 161, 14, 90, 81, 230, 28, 67, 221, 102, 60, 37, 5, 23, 1, 240, 15, 174, 215, 231, 123, 58, 99, 96, 79, 133, 48, 248, 126, 132, 250, 133, 36, 4, 138, 193, 205, 130, 252, 31, 189, 99, 119, 253, 126, 88, 4 ], "signatures": [ "10d6403a98461254be02936a5c8b2588a39d756dcf54a2447e784b7c92e82e0c72fbf9f884e70f169ef5accce2a6ad09245b507c736bad7f190fa120d2649109abc1fbb08d62b1409e09474c1ceb95501e8fba4f3e49e945a5d43a2f0dfec509775754790f9753f79d0604f6d58c571533b7cedef85158de9295e5e98a22d707", "ca4a606f88cfd3b603aa589f4ef27cf48b3dc3f1abb592cd954e3f8294de0902c559bedc494140862aa4ead0382adebc478d0689a5c544726de909209e4cbb01bc4c3c1bcbef2d8b21cae3098e5e6616f0aa3853eff4936b13560efe2a74930dab4cf10240c95f36be3684208d5894a981a4ca59d4fa8250254308cd33775802", "fe096b264fd10a60817079a495caab46eb818869b8138e63640040378108e20f9ac7b1bca5e1d680623c6940b96c177eeb1f9a0db00236bb8373a749b8cffa035bbbfdcb95a0e6cf9da9b7b2a10f208c0ddb18d0a2c72bdbb19fd87f2110f80c75fb8a7f9e9b0458e37f7d6a7ab611768938c7aa1f9704a15779460396ee1f0e", "edd24f247c6b106fe6cfd536caa3dad19d9e1a1b43c7ec4cebec97bcdc2911015264967ecac129bb875b0c6687dca52df27813fee3958af248981f395258a70598827364b6b35c4d37da8e6d740bf179565590e2654f44379c4d61ea4e43dd04b76c6abe1417edfd01a2d2d458fdb6050675d6c26276656d162fb9cdffa7cc02"] }


Less details
source code | moneroexplorer