Monero Transaction 411ff73970177f2ebf973997c930a237986096d23a5d5a804299a61118a9d384

Autorefresh is ON (10 s)

Tx hash: 411ff73970177f2ebf973997c930a237986096d23a5d5a804299a61118a9d384

Tx public key: 376478fa283e2d62e1f7c9e4a4c3b407dceb2d3f0100e623455582fb616e9d47

Transaction 411ff73970177f2ebf973997c930a237986096d23a5d5a804299a61118a9d384 was carried out on the Monero network on 2020-12-05 18:45:24. The transaction has 1066342 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1607193924 Timestamp [UTC]: 2020-12-05 18:45:24 Age [y:d:h:m:s]: 04:022:14:51:28
Block: 2245676 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.0938 kB
Tx version: 2 No of confirmations: 1066342 RingCT/type: yes/0
Extra: 01376478fa283e2d62e1f7c9e4a4c3b407dceb2d3f0100e623455582fb616e9d4702080037ef3a5b995c00

1 output(s) for total of 1.294294701216 xmr

stealth address amount amount idx tag
00: 14f5abb4aa7b1cd5fffd38b228b7266779479928781bc7d813b759c9949ce43c 1.294294701216 24021078 of 0 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer