Monero Transaction 34e0c46a1052476c05bdf3dd0ba181a3575a9bd5f1dfafb4dbbb1b2324c2726f

Autorefresh is ON (10 s)

Tx hash: 34e0c46a1052476c05bdf3dd0ba181a3575a9bd5f1dfafb4dbbb1b2324c2726f

Tx public key: 4ab2337791e5d7574371e380791432571a9c4f31deb2379e377d9320f70064cf

Transaction 34e0c46a1052476c05bdf3dd0ba181a3575a9bd5f1dfafb4dbbb1b2324c2726f was carried out on the Monero network on 2019-01-16 08:25:53. The transaction has 1557862 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1547627153 Timestamp [UTC]: 2019-01-16 08:25:53 Age [y:d:h:m:s]: 05:341:09:16:37
Block: 1750094 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.0918 kB
Tx version: 2 No of confirmations: 1557862 RingCT/type: yes/0
Extra: 014ab2337791e5d7574371e380791432571a9c4f31deb2379e377d9320f70064cf02080000028aee6d3300

1 output(s) for total of 3.285838067104 xmr

stealth address amount amount idx tag
00: 85a1b1d3eb26d88a1a9e9c61809a9c1f372a9d55bfaf1d4f3db614aa1905d9c6 3.285838067104 8606399 of 0 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer