Monero Transaction 5052aa24c3f4dd623788f0a68f1ff4aa01e702d815c71f0a336ad90eea2667c2

Autorefresh is OFF

Tx hash: 5052aa24c3f4dd623788f0a68f1ff4aa01e702d815c71f0a336ad90eea2667c2

Tx public key: e9d2ae7aa3edd9c0f1a74d62145f1e1cfd9de0b1ee0989c73730d1b33dad1d44

Transaction 5052aa24c3f4dd623788f0a68f1ff4aa01e702d815c71f0a336ad90eea2667c2 was carried out on the Monero network on 2019-12-29 12:25:06. The transaction has 1302408 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1577622306 Timestamp [UTC]: 2019-12-29 12:25:06 Age [y:d:h:m:s]: 04:350:19:07:29
Block: 1999488 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1006 kB
Tx version: 2 No of confirmations: 1302408 RingCT/type: yes/0
Extra: 01e9d2ae7aa3edd9c0f1a74d62145f1e1cfd9de0b1ee0989c73730d1b33dad1d440211000001ce647af700000000000000000000

1 output(s) for total of 2.042056593132 xmr

stealth address amount amount idx tag
00: 86a200f84bc1150dc7d5d868932756d5fa320952e6628f3e749939e8da9ed754 2.042056593132 14001959 of 0 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer