Monero Transaction 57944082f282c4b1c349c81dea9e0d8ad6c5488e3a1209af3f8a084e79508e2b

Autorefresh is OFF

Tx hash: 57944082f282c4b1c349c81dea9e0d8ad6c5488e3a1209af3f8a084e79508e2b

Tx public key: 05a0e29e825031ec76b6d4be9eeebbcfb85e05f5a354cd55f3891433e5316405

Transaction 57944082f282c4b1c349c81dea9e0d8ad6c5488e3a1209af3f8a084e79508e2b was carried out on the Monero network on 2016-07-14 12:27:20. The transaction has 2204694 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1468499240 Timestamp [UTC]: 2016-07-14 12:27:20 Age [y:d:h:m:s]: 08:145:03:50:15
Block: 1091058 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.3223 kB
Tx version: 1 No of confirmations: 2204694 RingCT/type: no
Extra: 0105a0e29e825031ec76b6d4be9eeebbcfb85e05f5a354cd55f3891433e53164050211d9d4460000000000000000000000000000032100757425d4c2f14f5f458355a5c185fe272f089f763c27b7a019794b1a0ad65ccc

6 output(s) for total of 11.534400000000 xmr

stealth address amount amount idx tag
00: 11887cd142adb4cc47e02bdb0a5e7910875884ee835fd9a2845eb58971eac7b1 0.000400000000 45948 of 77134 -
01: f3ceb299c63759a344cd030666cf968d9aa7c4232a9bcf3e1c1adc0073e97bc3 0.004000000000 46879 of 89181 -
02: 757995e0d68eb0270ba3293a055e9294047d7316ee8686e7ecb3cd8d5041476f 0.030000000000 273091 of 324336 -
03: 93511176bbbe8be7d6b894c5af9ce3d5e10f63d732b0180446c30231d34e72ac 0.500000000000 1015692 of 1118624 -
04: dcba57d042ad902624b1d1332e3df6bbdcf77581646542e48ab9b2c6eb0fbf78 1.000000000000 742166 of 874629 -
05: 4a1afb97d899792b52ec3a5e49d45359c19a92a223a105ff35a4dd6dd3785699 10.000000000000 806970 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer