Monero Transaction 040059ed3811e538582dc7d43b01ee4ee3793a39d928e7f5da9d7a16ebaa3e4d

Autorefresh is ON (10 s)

Tx hash: 040059ed3811e538582dc7d43b01ee4ee3793a39d928e7f5da9d7a16ebaa3e4d

Tx public key: 928d4c7e254bdb7a910ce888617878032164fc4ce21b7ad2db5c79ce7d8d10be

Transaction 040059ed3811e538582dc7d43b01ee4ee3793a39d928e7f5da9d7a16ebaa3e4d was carried out on the Monero network on 2019-04-08 13:46:47. The transaction has 1496785 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1554731207 Timestamp [UTC]: 2019-04-08 13:46:47 Age [y:d:h:m:s]: 05:255:13:01:39
Block: 1808554 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.0918 kB
Tx version: 2 No of confirmations: 1496785 RingCT/type: yes/0
Extra: 01928d4c7e254bdb7a910ce888617878032164fc4ce21b7ad2db5c79ce7d8d10be0208000002f25b080000

1 output(s) for total of 3.050835548454 xmr

stealth address amount amount idx tag
00: d0c229123c481aca79fe8dce13028693051bfbae6f644fdf697cc348e50416c2 3.050835548454 9343773 of 0 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer