Monero Transaction ba52fddd9e1d2d7824186cd85f736156aa58317a3e4a3e04f6e1765b4ecf17e7

Autorefresh is ON (10 s)

Tx hash: ba52fddd9e1d2d7824186cd85f736156aa58317a3e4a3e04f6e1765b4ecf17e7

Tx public key: 4f2672d6e1ff3adb4c20238214413adc2c706114b676aa4a8a93bb2d286d3ce0
Payment id (encrypted): 94615cf7da795045

Transaction ba52fddd9e1d2d7824186cd85f736156aa58317a3e4a3e04f6e1765b4ecf17e7 was carried out on the Monero network on 2020-10-11 21:13:12. The transaction has 1082699 confirmations. Total output fee is 0.000023890000 XMR.

Timestamp: 1602450792 Timestamp [UTC]: 2020-10-11 21:13:12 Age [y:d:h:m:s]: 04:045:09:21:30
Block: 2206242 Fee (per_kB): 0.000023890000 (0.000009398141) Tx size: 2.5420 kB
Tx version: 2 No of confirmations: 1082699 RingCT/type: yes/4
Extra: 014f2672d6e1ff3adb4c20238214413adc2c706114b676aa4a8a93bb2d286d3ce002090194615cf7da795045

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: 1206437263c7ad0a1bbf33446c04c79712383bdb6e15b6715c39dec30d462428 ? 21729324 of 120141230 -
01: 2b629a75691a98843211cf89077eea3cc05ace7997d9236270188008fcb57ee3 ? 21729325 of 120141230 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 input(s) for total of ? xmr

key image 00: e4c93cb915291628d0c04268dd40395cdb289ed6264d51a2a3d2d39840e751d2 amount: ?
ring members blk
- 00: dc0dfa70583265dea834268c607bc9f0c76b861f6c6cd4b6f14c247e6fe034a3 02146654
- 01: 458a5c5c718b7ff2ab29e1679e96caad0ca61d0ea980fce3979117c788ce4f8c 02200451
- 02: 5ddee30a2e96e33b768f8f2c3de30cd0f9c1bdd65c218ab1bb0f53214aa72c2f 02202294
- 03: f3095615a71ee585462c0acee74d8cbe217ceda19b4561d3c2fa588b79e9ef0f 02203527
- 04: 72d25c983ef6042b03ec5cfc132b3a1e7b5d82078fad705f3dc963c56f96b65b 02205080
- 05: 6b40dd0550d935a94c8cc4d754ea3605aea58f6c560ce7f5347caf7a61c6a6cc 02205985
- 06: 0664b4be904da8db8d79ea9a70b7ebf1bc7f2b1686aa1c5c38a036f6029ae16d 02206153
- 07: a347719441301b89769a683a5069f9ccfd52b959538b9e04709289cca28e07fc 02206221
- 08: 82aa5fb9bde52dc056d0e7fa405a64c1c35ab99e469376e75a2ef39e3c6e3ca7 02206221
- 09: 177c1c9180eeea382cce1a4302af8008265481ed1d8896e4c7ac9ec3c8aa1e95 02206221
- 10: 4c49671a79091c0f56398aa1548bc176aba5066c453a401d06b00c8797184849 02206224
key image 01: 0fb72612f5b9d6953831be1e6aca55b75f95bdf38cb36b3954c97e219be3bbc3 amount: ?
ring members blk
- 00: 9740da5f91b4467b4856c8aba7438941fa4ac6350dcdb7d6715d7b49ddbad939 02195973
- 01: 3b04821a8db2f1d8e39440f67369cb7148a557afcc5e82ee91e3ea5c43950d22 02202892
- 02: 34cc28aecf148bdfbee6b8a577990b48ee95b9e0280373a70683bc73a10b0eaf 02203909
- 03: 16cf273c6cbd94fb6db02f5bd862abf38d3a1b986681283b6b2f9bd12014c30e 02205810
- 04: 24f0a7b9cc57d2bee854b646c203a8d1ee36a1a6f35672b566b40598db7cb529 02205891
- 05: ed08b07e9823cb49dc29b05f3af5dcd21c8b666af9d159b7adf0a28dbfd4aa36 02205972
- 06: f8acd6e1bb31886b0959ea046fdd33d6abc25cc4b416a13b937fc9593c7e6708 02206132
- 07: 393ba310d7b7a00f319cb0e28190535e789147a4c5a90230d679da4b324b6983 02206139
- 08: 8013a68fbe779b3a8d3a31711d725ac824a61044565ddc0416b1af5e9017f12c 02206170
- 09: 3c57cc26f2704e4e0c51e0ce8355ba1408bb9156cccc332a30af49fa9bdf064c 02206215
- 10: 0230375586abda1cc082c57a73cd09094c551e278b5057bfabb6f5b4ed0d0169 02206231
More details
source code | moneroexplorer