Monero Transaction 5807e0ff46e5e0c5b0ae6e46c1d92d0ba5ab4f0ea4f89f5e05d3eff0ee1212d5

Autorefresh is OFF

Tx hash: 5807e0ff46e5e0c5b0ae6e46c1d92d0ba5ab4f0ea4f89f5e05d3eff0ee1212d5

Tx public key: ff2975e51483dc6b1b7b5bb27208dd8ed09ec082af84e3878b5e09c4e008d6a9

Transaction 5807e0ff46e5e0c5b0ae6e46c1d92d0ba5ab4f0ea4f89f5e05d3eff0ee1212d5 was carried out on the Monero network on 2015-01-22 20:40:48. The transaction has 2957619 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1421959248 Timestamp [UTC]: 2015-01-22 20:40:48 Age [y:d:h:m:s]: 10:044:15:01:37
Block: 403456 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1680 kB
Tx version: 1 No of confirmations: 2957619 RingCT/type: no
Extra: 01ff2975e51483dc6b1b7b5bb27208dd8ed09ec082af84e3878b5e09c4e008d6a90208000000003be3b69a

3 output(s) for total of 12.056687756864 xmr

stealth address amount amount idx tag
00: a9aecd0035e2693708667daa51a9cc23354d97eecf9a31d9fe44ffd49f1d0185 0.056687756864 0 of 1 -
01: 0da48bcee82079cb13291f42871efba6a2a8057fcd46b80f905882a7ac03180f 2.000000000000 233336 of 434058 -
02: 943dd0e693ff3313c7d14fa4e072b5a279f318e98c89eb3c1ff8e7f517781adf 10.000000000000 466079 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer