Monero Transaction 219e1d55da217d06a5b4cfc1c190f4ecc312fce8b17eac56f53072ac8dc0b4b8

Autorefresh is ON (10 s)

Tx hash: 219e1d55da217d06a5b4cfc1c190f4ecc312fce8b17eac56f53072ac8dc0b4b8

Tx public key: 65dd2849aab1e715efbf75a38693d7bb77128b6def05f261d136f7db66618738

Transaction 219e1d55da217d06a5b4cfc1c190f4ecc312fce8b17eac56f53072ac8dc0b4b8 was carried out on the Monero network on 2019-01-05 22:23:25. The transaction has 1561921 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1546727005 Timestamp [UTC]: 2019-01-05 22:23:25 Age [y:d:h:m:s]: 05:346:20:38:01
Block: 1742486 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.0918 kB
Tx version: 2 No of confirmations: 1561921 RingCT/type: yes/0
Extra: 0165dd2849aab1e715efbf75a38693d7bb77128b6def05f261d136f7db6661873802080000006991fd4c00

1 output(s) for total of 3.333950185595 xmr

stealth address amount amount idx tag
00: 7f729d3356a38862b727114e7574b809a3a128828cc03a42959c46c25fa051ce 3.333950185595 8504074 of 0 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer