Monero Transaction 52bb18fb9b040d541ad7328ccd6ea2335f7d27bbbe8520faff753236a63d6254

Autorefresh is OFF

Tx hash: 52bb18fb9b040d541ad7328ccd6ea2335f7d27bbbe8520faff753236a63d6254

Tx public key: 35b421ca6a1fe01c8f17f6ef7190b5b8688edf3035da4e47ff5fcc7b4c1f8a0f
Payment id: b74bf1204f23737382e9de054dd531cb3056769970d473383d5b3a624e8f012b

Transaction 52bb18fb9b040d541ad7328ccd6ea2335f7d27bbbe8520faff753236a63d6254 was carried out on the Monero network on 2015-12-04 09:42:19. The transaction has 2440807 confirmations. Total output fee is 0.011846274017 XMR.

Timestamp: 1449222139 Timestamp [UTC]: 2015-12-04 09:42:19 Age [y:d:h:m:s]: 09:001:17:14:00
Block: 853816 Fee (per_kB): 0.011846274017 (0.023418116976) Tx size: 0.5059 kB
Tx version: 1 No of confirmations: 2440807 RingCT/type: no
Extra: 022100b74bf1204f23737382e9de054dd531cb3056769970d473383d5b3a624e8f012b0135b421ca6a1fe01c8f17f6ef7190b5b8688edf3035da4e47ff5fcc7b4c1f8a0f

6 output(s) for total of 6.994687290000 xmr

stealth address amount amount idx tag
00: 2854f9a3a249c93e91c4cfc49d6e14da43951e89fd074c59917441a8da1d66e5 0.004687290000 0 of 1 -
01: f4d62df074ea2d481f63f0b52fc719651a11f1b9b4c60321b527bab8a825df8f 0.010000000000 412561 of 502466 -
02: d007d5de0da3f8f1605860e24c6dec6d4048e8fe270d5322cfddb69f54fc571d 0.080000000000 173013 of 269576 -
03: f32f370cdc43fd68dea931e44b33bcc93a621cdcee5c149febfe648977aa5380 0.200000000000 1041856 of 1272210 -
04: bbadba71be953b655f0be5c5b24f82ba6aeebb79c7c724607cb761ea4b71ced4 0.700000000000 384401 of 514467 -
05: c3f7df78ddb09c7672a0c24119d3d0a5a0b34914de8a395c6d5f3f90b4f6c9c2 6.000000000000 124477 of 207703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 7.006533564017 xmr

key image 00: b6dcddec0719e6e427b34eb38d6ad44fc4d55195479bbae0019e9ec02e072aa8 amount: 0.006533564017
ring members blk
- 00: 495c8205a3f8b7e3eb13c837dc6d9c5a8b55516276931c14a933b86f05d1a21e 00811266
key image 01: 06417d7b381c8ea96ea099d13a6ea959cf977bc2e43113e168d97bce56f70bc1 amount: 7.000000000000
ring members blk
- 00: 5035a40651059a63edfc2eb94d12b41df58881427eb6b841e0330900215bafab 00849749
More details
source code | moneroexplorer