Monero Transaction 52d35536fe2b7871b7d018a451556965cc70295bba4d2b85dfe0748362a78253

Autorefresh is OFF

Tx hash: 52d35536fe2b7871b7d018a451556965cc70295bba4d2b85dfe0748362a78253

Tx prefix hash: 5bcb72232693aaff981458d558045403d71d1d09cd03914fae534d1ea30487de
Tx public key: 199b0cb910776c617c1e6f665de6dc3483a79745f2d9ef0e7807fc7a5cb5e5d1
Payment id: fc75126dd69b836423b8ba586ab62ed621632cc58635cde928056b69e2929568

Transaction 52d35536fe2b7871b7d018a451556965cc70295bba4d2b85dfe0748362a78253 was carried out on the Monero network on 2014-06-28 15:25:24. The transaction has 3172937 confirmations. Total output fee is 0.012649450000 XMR.

Timestamp: 1403969124 Timestamp [UTC]: 2014-06-28 15:25:24 Age [y:d:h:m:s]: 10:137:23:34:35
Block: 105462 Fee (per_kB): 0.012649450000 (0.014669350849) Tx size: 0.8623 kB
Tx version: 1 No of confirmations: 3172937 RingCT/type: no
Extra: 022100fc75126dd69b836423b8ba586ab62ed621632cc58635cde928056b69e292956801199b0cb910776c617c1e6f665de6dc3483a79745f2d9ef0e7807fc7a5cb5e5d1

7 output(s) for total of 98.992350550000 xmr

stealth address amount amount idx tag
00: 278bce3239978bb252c746435eef70c1c2dc661ef3af352f542974866696b53c 0.002350550000 0 of 1 -
01: 425f9671a3baa096cd6363aaa730f7718fde2bf2dec0539a305786d445a85105 0.090000000000 69816 of 317822 -
02: 801255cb5a00ded3bd8b25b6edaa5ab26cf2d8432e5ea5c05a9623de3aaeda3e 0.300000000000 69005 of 976536 -
03: 50f5d9cf4ec6ce1e03702539629b4886daab48c1a60cf136cde1f52097ac6bc3 0.600000000000 41931 of 650760 -
04: ad7726f3986ef912cd915bfeafa41fd485af759063d1b4aa11b84fc92672c87b 8.000000000000 6678 of 226902 -
05: 5a06fda7587682b45238aaf18675c0413fdb651d9faa01110418196dbf6ce45c 30.000000000000 2062 of 49201 -
06: d2c0fed836b574b460486d27f248d756dd1ab7de313265354189268a472d5cbd 60.000000000000 815 of 26317 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-08 00:19:06 till 2014-06-27 06:21:14; resolution: 0.11 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________*________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |___________________________________________________________________________________________________________*______________________________________________________________|
  • |____________*_____________________________________________________________________________________________________________________________________________________________|

5 inputs(s) for total of 99.005000000000 xmr

key image 00: 4d56cbee77638b4b8971c41ad201857586c0f2fe359ba052728228611a6bc78c amount: 0.005000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 87aa06c311de8dddd6e37a129dd721ef253ff6dcdcab53a3c72ba638707b052d 00075466 1 40/2 2014-06-08 01:19:06 10:158:13:40:53
key image 01: f7528a8a2b13d32471791ced9c395e396fe15f06cc45e4968f479786d8f29a1f amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 663e10e1fc28078529000d80ab62b3c15d671436032dcfd067aba24c0a2a5dc7 00098062 1 34/6 2014-06-23 12:10:43 10:143:02:49:16
key image 02: 761317dbdb3c48983ca8296d9f6b8869346d28251619de5a41dfb7498b36395d amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ef876dd6a137fb92b051e1dba468d72d7ed3e9c1550a409f8bf25e8f0e8643ae 00103375 1 61/4 2014-06-27 05:21:14 10:139:09:38:45
key image 03: 70030a1fb19b4c466e92a4ed348377bb7851417a56bd24aa2305d61420b77e23 amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 86624d950bc25d89956af58fc7068be34f4fab980de6077c497685eae49ac9f7 00093137 1 10/4 2014-06-20 04:05:13 10:146:10:54:46
key image 04: 13e20a69c123c3c989507acdd0feb9c5ce0b1a8970fcfbc6fd79896b0d5bea0a amount: 90.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0a1648513e79f5791ccfe430b76150727352b9d403b041040876485e51b0de14 00077228 1 5/6 2014-06-09 06:48:05 10:157:08:11:54
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000, "key_offsets": [ 65656 ], "k_image": "4d56cbee77638b4b8971c41ad201857586c0f2fe359ba052728228611a6bc78c" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 18232 ], "k_image": "f7528a8a2b13d32471791ced9c395e396fe15f06cc45e4968f479786d8f29a1f" } }, { "key": { "amount": 3000000000000, "key_offsets": [ 16758 ], "k_image": "761317dbdb3c48983ca8296d9f6b8869346d28251619de5a41dfb7498b36395d" } }, { "key": { "amount": 1000000000000, "key_offsets": [ 32593 ], "k_image": "70030a1fb19b4c466e92a4ed348377bb7851417a56bd24aa2305d61420b77e23" } }, { "key": { "amount": 90000000000000, "key_offsets": [ 541 ], "k_image": "13e20a69c123c3c989507acdd0feb9c5ce0b1a8970fcfbc6fd79896b0d5bea0a" } } ], "vout": [ { "amount": 2350550000, "target": { "key": "278bce3239978bb252c746435eef70c1c2dc661ef3af352f542974866696b53c" } }, { "amount": 90000000000, "target": { "key": "425f9671a3baa096cd6363aaa730f7718fde2bf2dec0539a305786d445a85105" } }, { "amount": 300000000000, "target": { "key": "801255cb5a00ded3bd8b25b6edaa5ab26cf2d8432e5ea5c05a9623de3aaeda3e" } }, { "amount": 600000000000, "target": { "key": "50f5d9cf4ec6ce1e03702539629b4886daab48c1a60cf136cde1f52097ac6bc3" } }, { "amount": 8000000000000, "target": { "key": "ad7726f3986ef912cd915bfeafa41fd485af759063d1b4aa11b84fc92672c87b" } }, { "amount": 30000000000000, "target": { "key": "5a06fda7587682b45238aaf18675c0413fdb651d9faa01110418196dbf6ce45c" } }, { "amount": 60000000000000, "target": { "key": "d2c0fed836b574b460486d27f248d756dd1ab7de313265354189268a472d5cbd" } } ], "extra": [ 2, 33, 0, 252, 117, 18, 109, 214, 155, 131, 100, 35, 184, 186, 88, 106, 182, 46, 214, 33, 99, 44, 197, 134, 53, 205, 233, 40, 5, 107, 105, 226, 146, 149, 104, 1, 25, 155, 12, 185, 16, 119, 108, 97, 124, 30, 111, 102, 93, 230, 220, 52, 131, 167, 151, 69, 242, 217, 239, 14, 120, 7, 252, 122, 92, 181, 229, 209 ], "signatures": [ "eda83d7df7b30c28330698bb3754d16dc3fda9af3fe12d0328409db2dc93ef0df7be1fddbaa39363e9588107c0daf28c1677f6c43b49a4cedc8c2a6d764fce0a", "9a0d5a9381cc17c21be3a522d0a48f076af98d160e446c8cb35fc161e16c810f90855d587762071ff27c7f5b23da40608f7bd9f417a9a7aa508f1a3ebb060a07", "436db17b0a6d391353174b730a0e2320be2283c572694835204b55b38815930efe56498942a20644687c1cf4f7cac4f109e0479e12849ce535cf5af7e831b004", "791077c294bc7d37269d08fea0e3c7e411cb7e373cea60b7f1dcff869e87a50728da25544723cf3b97d20fbf05ef3036ab5b6197d1b237d48f10b1f3f10efd04", "13df333e24d2d1078dc7337293fbe35d4b710561564263b247c557d75b9f640ea69062cbdf67d1694b3142ff5f0fcbe2bc94d4b7538a925bcc9823475e396802"] }


Less details
source code | moneroexplorer