Monero Transaction 52fa7d71abb598da035508a047c03399ee533cb4e2f5fdac9d81df0a0f333380

Autorefresh is ON (10 s)

Tx hash: 52fa7d71abb598da035508a047c03399ee533cb4e2f5fdac9d81df0a0f333380

Tx public key: 2fd00db6eea0a72e24a7b67517a5d1177d62c689442820e4b6f0fbb561d6ffb8
Payment id (encrypted): 9089411019733121

Transaction 52fa7d71abb598da035508a047c03399ee533cb4e2f5fdac9d81df0a0f333380 was carried out on the Monero network on 2020-10-12 22:32:22. The transaction has 1099985 confirmations. Total output fee is 0.000023890000 XMR.

Timestamp: 1602541942 Timestamp [UTC]: 2020-10-12 22:32:22 Age [y:d:h:m:s]: 04:069:13:37:35
Block: 2207060 Fee (per_kB): 0.000023890000 (0.000009383721) Tx size: 2.5459 kB
Tx version: 2 No of confirmations: 1099985 RingCT/type: yes/4
Extra: 012fd00db6eea0a72e24a7b67517a5d1177d62c689442820e4b6f0fbb561d6ffb80209019089411019733121

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: 6bd627a8a1291e55f662b1e408907d3be515d9545a5117eff3d8180a1b724385 ? 21779930 of 121973380 -
01: 0486ec4d77842d4c630aedd7c9a176bbfa142cb9fd3d51c4e447528b61a65fcc ? 21779931 of 121973380 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 input(s) for total of ? xmr

key image 00: f1deafc295e1b3196eed976fcd8600a1874bf09329b31198cd26706ae636ec5c amount: ?
ring members blk
- 00: e7d2aed4665634fa364dd165f821603f19e2125f88dd5af444ee1eec65941c4c 02174937
- 01: c2ba8d03f36380121f75605426842d109e03961cf0d87e3ede7a8fed875946ff 02183666
- 02: 3bcdef16609c837ff2403eb93ad756de83cd4fe1997d1cddded8c3001600a8d5 02187200
- 03: c9704cdf53992994aacef6749041af580d7450df707dcb3c171ec86ba6fd184b 02191755
- 04: 3c199a8985293913f57498cebd7b7e213bab0f1806c33254270820078b9f81df 02198210
- 05: a606da688de5df568e1da45034d730e8d51fd3d980e6cc1b4cf5d8321a4725f3 02204719
- 06: b5f118b8c0b7cc6ffdbc6a91dcc3bf49bd41ad5cedab4447283f2f63e5ce4eac 02204808
- 07: 704179576cf91f83ca1f1ad6defb5ac874c1ee30b14ae5c7e017c0bfde30ec83 02206913
- 08: f34753ada5d0329d778a999e4f899028d903e13bb2d10f3bf91cf6a691e447ca 02207015
- 09: 65cbde1507ed5c5e13808e1b3d6277d22bee5ef0780f14f6b2e0c29c3ffae81a 02207030
- 10: 34ae8a04d3e54aa21227e8357e07c2e2d1966b46ad4fc4c3045d13d202479b7c 02207049
key image 01: a41a5580a522dcd4df64569767c0e0b16ef43b6134bfbd47f23ee458be127410 amount: ?
ring members blk
- 00: d0228304f817c837ebae24a12b9a1980b12776b1db0f0f42e7645d01b5fe6565 02122934
- 01: d1c891466ad9eac05bef6fd35f1b4b70d696d010a55209bbb936af4671edd981 02177715
- 02: e6f6a866cf6ead43aba21011bbac3bfd30ba09cb2ce85b0702a020adf52a5558 02198532
- 03: 3a6828c52d878a8b100394dd5c20d684d0eeedbe7b938e98e822ae18108fd928 02200946
- 04: f68bca7f6561159a9bb2fefa48d01d19c7716cf686d7899a5c3b07e89b26e658 02205554
- 05: b0f079d34a4b5be314a6289c819cce37ce8c09b0c55797c359fc1dcdc2040d7b 02205815
- 06: c651ecb0f2382fc8c98a67f6f5de7754cd7ceca5f7f3371a14566653c17876ba 02206040
- 07: 5c13140bc20a5c62fef3aea2222bc084ef0e5e152798c3b185017b1147d0f056 02206126
- 08: 55204dd42ce137118bda71c0e774366d07a915806de319b07ad211fe56143db1 02206872
- 09: 72ef156ed4c57e7f6cef88bca9d52361f254b9cf13d91b6974b49726eb098351 02207011
- 10: 2a2bda74b2cfdcb188c78ffc5b2cd8dd2a35a07441d3d3f330ea1d08ef1aaaba 02207020
More details
source code | moneroexplorer