Monero Transaction 28e0e503c9fbe678b8502718e4bbd2b782971c5e7e738812b74e3237ed2cd591

Autorefresh is OFF

Tx hash: 28e0e503c9fbe678b8502718e4bbd2b782971c5e7e738812b74e3237ed2cd591

Tx public key: 668e7ff87438b656c847e33dc6d7be226f9f47052d31cdfd8ff21af412dbba31

Transaction 28e0e503c9fbe678b8502718e4bbd2b782971c5e7e738812b74e3237ed2cd591 was carried out on the Monero network on 2016-06-27 03:34:59. The transaction has 2291761 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1466998499 Timestamp [UTC]: 2016-06-27 03:34:59 Age [y:d:h:m:s]: 08:266:00:41:15
Block: 1078452 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.3213 kB
Tx version: 1 No of confirmations: 2291761 RingCT/type: no
Extra: 01668e7ff87438b656c847e33dc6d7be226f9f47052d31cdfd8ff21af412dbba310211d9f2620000000000000000000000000000032100ad0663e586be913e176aec8c16e90d64e33c7b3cd4086ee17c7e7a8474f0df91

6 output(s) for total of 11.815100000000 xmr

stealth address amount amount idx tag
00: f1438a967ddb520ddc35368bff53ae42b29bc29fc69327f89afbb7f9f575c5e9 0.000100000000 44986 of 79263 -
01: 33ec1543c2f2c73bce8de5752fc3b42d75bb0f11cf74a3419f9812a803deb51d 0.005000000000 259795 of 308586 -
02: e27b9632450889b1195043e0b876341244531dd475ab8df3f653b24d19b5054c 0.010000000000 442792 of 502466 -
03: 78df4c43a9b45541a079186bada0e4bc0c4fa74b07b23b5c760c57f75c9a16fa 0.800000000000 422212 of 489955 -
04: e2f07d05161c1d1a019c6f1bffd5177e3ff9058ba0b85178f80167ae2d9e414d 1.000000000000 725822 of 874630 -
05: 44491b98605fcf3c5f885e9e3f8d01c675f12feb79f2edcf1f9780d54a9ede1e 10.000000000000 792134 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer