Monero Transaction 14f52a0d189bc1cadf10a4d906e45d9a2530e19cb69a28704bd98327cb4153af

Autorefresh is ON (10 s)

Tx hash: 14f52a0d189bc1cadf10a4d906e45d9a2530e19cb69a28704bd98327cb4153af

Tx public key: 4989e0a83def46156f9ab141e6bab2db899aa5d0da00174a07372c806a6af624

Transaction 14f52a0d189bc1cadf10a4d906e45d9a2530e19cb69a28704bd98327cb4153af was carried out on the Monero network on 2020-05-07 20:42:30. The transaction has 1198849 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1588884150 Timestamp [UTC]: 2020-05-07 20:42:30 Age [y:d:h:m:s]: 04:206:22:07:48
Block: 2093342 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1006 kB
Tx version: 2 No of confirmations: 1198849 RingCT/type: yes/0
Extra: 014989e0a83def46156f9ab141e6bab2db899aa5d0da00174a07372c806a6af6240211000000425fb34a0d000000020000104600

1 output(s) for total of 1.709124806365 xmr

stealth address amount amount idx tag
00: 8002f0e8412709aaa5f46dae23473b156e5163dbb950700629c0d981406948d1 1.709124806365 17022963 of 0 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer