Monero Transaction 232c3ff6eaaefe53d04cd00b5a23b1dc2d6ca72f4861244c20f98b660e162e12

Autorefresh is ON (10 s)

Tx hash: 232c3ff6eaaefe53d04cd00b5a23b1dc2d6ca72f4861244c20f98b660e162e12

Tx public key: 260d3aca982852a5a89c550664aed4e55e3fb7ed1c8f3445e5f5b1143a873892

Transaction 232c3ff6eaaefe53d04cd00b5a23b1dc2d6ca72f4861244c20f98b660e162e12 was carried out on the Monero network on 2019-09-24 10:02:05. The transaction has 1378363 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1569319325 Timestamp [UTC]: 2019-09-24 10:02:05 Age [y:d:h:m:s]: 05:090:20:56:08
Block: 1929999 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.0879 kB
Tx version: 2 No of confirmations: 1378363 RingCT/type: yes/0
Extra: 01260d3aca982852a5a89c550664aed4e55e3fb7ed1c8f3445e5f5b1143a873892020438cc5939

1 output(s) for total of 2.335252849784 xmr

stealth address amount amount idx tag
00: 56ff73bfb78791ee70690efd0dd285616f220ae79f34571e9ffdbbb7a7f9ce6d 2.335252849784 12467462 of 0 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer