Monero Transaction 14db040c134829c8622e83282efe3193cb3dce6c30efe03e9af25f8991cfe4f2

Autorefresh is OFF

Tx hash: 14db040c134829c8622e83282efe3193cb3dce6c30efe03e9af25f8991cfe4f2

Tx public key: c30399a432328e102b0f9eddc64d9758bf5039b0113f9448ce3f44775addbfff

Transaction 14db040c134829c8622e83282efe3193cb3dce6c30efe03e9af25f8991cfe4f2 was carried out on the Monero network on 2019-05-24 18:58:34. The transaction has 1509756 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1558724314 Timestamp [UTC]: 2019-05-24 18:58:34 Age [y:d:h:m:s]: 05:273:10:59:33
Block: 1841824 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.0918 kB
Tx version: 2 No of confirmations: 1509756 RingCT/type: yes/0
Extra: 01c30399a432328e102b0f9eddc64d9758bf5039b0113f9448ce3f44775addbfff02081d96cc5d52fdfc00

1 output(s) for total of 2.758426930105 xmr

stealth address amount amount idx tag
00: 5896f91b70e10cac9d56bddb3dadf20e53f1781e35b5c9d9b9c453ea6a83c29a 2.758426930105 10309196 of 0 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer