Monero Transaction 52d39b490b3aee5c5430af0d5c1da4d0d674d8c0190cf74b0dbbe7410056fd3f

Autorefresh is OFF

Tx hash: 52d39b490b3aee5c5430af0d5c1da4d0d674d8c0190cf74b0dbbe7410056fd3f

Tx public key: fbc382b611e0df22ef82ea2802f35a51d540fe9cc5ab6ac8128356a454e768ad
Payment id: 0d556b99ba0f03c5615864fae1de1d8f0b7a0334fe2490b7e31a5beae6ccb31d

Transaction 52d39b490b3aee5c5430af0d5c1da4d0d674d8c0190cf74b0dbbe7410056fd3f was carried out on the Monero network on 2016-12-29 08:06:42. The transaction has 2074672 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1482998802 Timestamp [UTC]: 2016-12-29 08:06:42 Age [y:d:h:m:s]: 07:329:16:55:03
Block: 1211945 Fee (per_kB): 0.010000000000 (0.008101265823) Tx size: 1.2344 kB
Tx version: 1 No of confirmations: 2074672 RingCT/type: no
Extra: 01fbc382b611e0df22ef82ea2802f35a51d540fe9cc5ab6ac8128356a454e768ad0221000d556b99ba0f03c5615864fae1de1d8f0b7a0334fe2490b7e31a5beae6ccb31dde205c92e970fccbf22a480a177ae89c65a6b4711f66a7f549a6f9483c04839887c0

25 output(s) for total of 9.990000000000 xmr

stealth address amount amount idx tag
00: 7a59fbf4d15909107029d8dc0074628bbeaeed5c03def38badd263886d15d500 0.000000000004 12260 of 16935 -
01: 2463adaf167fe9610f83b2ea6a0204ea5bf51615584efe28cf099e738c845030 0.000000000006 12079 of 16759 -
02: 25065869d611ace3d8799739706495f96dbe2abb3934b93b98c77990fe63ebe9 0.000000000040 12013 of 16608 -
03: 65d7bf661637170175ad1d2619ac91f109e2fd4a77867fdb4ad3bb5268181e75 0.000000000050 13906 of 18973 -
04: 32590eca19d127a5e8a4d262476af47694324e0ea51789ee980d9527a3f44b09 0.000000000300 12868 of 17544 -
05: e77c825bf171a73c89aad1848fb9705eb0001f14f96476fba0f33d0b15c97f99 0.000000000600 12842 of 17524 -
06: 8061686b3d8b9bf65901963fc3ef8591c1a33ad00d10f53d43e8916652f298ca 0.000000004000 12532 of 17290 -
07: 2baf80d07d6c9cceffaaf6470de4bcf08dc04694e9feac40252e3fb83b5da2a8 0.000000005000 12869 of 17668 -
08: ff7c9412f51b08a253dd86854d92f85a56cf66f1dd576039d63ec0d01be2c52f 0.000000040000 17394 of 22714 -
09: a4b0fb04e464460760ef12bef3a7c1aa905961b77d8cd91df4fd9d84a9a99d7a 0.000000050000 17269 of 22583 -
10: 6779fa8b85f0d316204debdbf7ed3a704afdcf9cf76f3e97ca6c32567dc1f894 0.000000200000 17596 of 22931 -
11: fef885101a599ab5cbed3975c8b1537a5cd1c7851511d2a74a2cba2a31af025a 0.000000700000 17249 of 22578 -
12: 451559d023cb4b65d19c139d04ab3f8da50d55cf6ab58dee2fbfc0d5cd9e3ee5 0.000002000000 36199 of 41702 -
13: eeef3b13c33fba5e860bb39729dc687c7a341440f65cc563012596114888adb5 0.000007000000 35930 of 41473 -
14: cf1a9cbafb6c80f0fc2a17fc502ca7c689e272307904eb781429b49709bd5932 0.000020000000 54019 of 59482 -
15: 2a3cd461f4d1e00545540f0cbee2c8680bbb92613a218edd59565b3793a73936 0.000070000000 53594 of 59071 -
16: b12f2eca3bda5b2d6e45fcf7cdfd3cadf4643cdc18399c0867c01f63aae7f67c 0.000400000000 70583 of 77134 -
17: 80662229fd2c4f82df1721f5d84ccbe47cef32b446a0a98d9c136fc15f59d06a 0.000500000000 71161 of 77939 -
18: 2111936bc262112ca2606fe92fbf989faced7c0ba75c072555873d5a15a55e20 0.002000000000 86208 of 95915 -
19: 70188a8498bcf7d73a228273ddd8dee97ef99277ad57b82f3ced3597b8594def 0.007000000000 237471 of 247340 -
20: e80cc6cd74ff5aedce42c20122545ebc2bc3123ef41a7713109028e507847e79 0.040000000000 283849 of 294095 -
21: 28e2c54c2dddfe1ae1ffb34835c00dea7d17d1032ef339c30fa6b88be4868cd4 0.040000000000 283850 of 294095 -
22: 8aab29a8e6a32d6c8b0343338c3c5924f61de2fa5abb83714eeb45e0c56911e0 0.200000000000 1249562 of 1272210 -
23: 34201acde6f8949aba5240d44b6b3900c90b2dc2b0f733fd5ee35ccfa6eda676 0.700000000000 505913 of 514467 -
24: 85c5406c948aa6897c1260a2cec9d2334f48f2f736e61ff21d9e282185a09214 9.000000000000 260668 of 274259 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



1 inputs(s) for total of 10.000000000000 xmr

key image 00: 4114ba4a9706828fe7f2b040cba7f590414b4a9920505b088d91c1d99e2f8b9a amount: 10.000000000000
ring members blk
- 00: f2dcad3e508e10b9f2d89d0412789c3667d36a6e5d92223d792b744b0534c675 00151893
- 01: a13a9a0242dcbfa6fa47a0fac7b524c2331c6c31e5b80e1a41e85cb841a9c319 00464167
- 02: b3d3a63eb45896e51d36ec6c38d4e5415e61b577baddf6a5fb2e4ec187ec7a46 01211636
More details
source code | moneroexplorer