Monero Transaction 0dd621e01712e457f7c03a452e4c07a0a70a203f073a2042c4fdaf79d01dbed2

Autorefresh is OFF

Tx hash: 0dd621e01712e457f7c03a452e4c07a0a70a203f073a2042c4fdaf79d01dbed2

Tx public key: f63ab36f7e44c66f668c1f3b772a6c7677197ea2c3e2d270e382c7e43778ee3e

Transaction 0dd621e01712e457f7c03a452e4c07a0a70a203f073a2042c4fdaf79d01dbed2 was carried out on the Monero network on 2014-11-19 17:53:36. The transaction has 3062654 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1416419616 Timestamp [UTC]: 2014-11-19 17:53:36 Age [y:d:h:m:s]: 10:127:16:46:23
Block: 312083 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1680 kB
Tx version: 1 No of confirmations: 3062654 RingCT/type: no
Extra: 01f63ab36f7e44c66f668c1f3b772a6c7677197ea2c3e2d270e382c7e43778ee3e020800000000103f106a

3 output(s) for total of 13.095326745162 xmr

stealth address amount amount idx tag
00: b6c92ffa10bd7c209918787a94565e80412e3c9b358fefea9c24d5da5a9e309e 0.095326745162 0 of 1 -
01: ef395aae349f335e8f6ac2c56f760db1612d333898ce883726157e14072a6440 3.000000000000 145339 of 300495 -
02: 827dbc3c00134f3c8a7f1ec39d972e4f50776e23c0d8e63d976d10d6d91d5698 10.000000000000 362639 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer