Monero Transaction 928d02b2a0ae10a36ec3e1b20717f66ccd68785ded68fb0d5f0194d4eb4a3eb8

Autorefresh is OFF

Tx hash: 928d02b2a0ae10a36ec3e1b20717f66ccd68785ded68fb0d5f0194d4eb4a3eb8

Tx public key: b0c43c135022aa820420d5f3ea7b02a46f6b3153829d60b4a4bd33b1ddb981b4

Transaction 928d02b2a0ae10a36ec3e1b20717f66ccd68785ded68fb0d5f0194d4eb4a3eb8 was carried out on the Monero network on 2016-05-11 11:39:02. The transaction has 2324383 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1462966742 Timestamp [UTC]: 2016-05-11 11:39:02 Age [y:d:h:m:s]: 08:311:09:31:38
Block: 1044907 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.3232 kB
Tx version: 1 No of confirmations: 2324383 RingCT/type: no
Extra: 01b0c43c135022aa820420d5f3ea7b02a46f6b3153829d60b4a4bd33b1ddb981b40211d8184700000000000000000000000000000321003845274361285cb5720cd0e6e5014a818ebcd80402c47845b628e4becbeb22aa

6 output(s) for total of 12.875500000000 xmr

stealth address amount amount idx tag
00: a38283e74145ee4a6f0d6e66e9d69ab0f226b8ff6790b849c956762b9e66ebb3 0.000500000000 41065 of 77940 -
01: 168501329eb9031ddbb14cfddea2e3ac5c2c7596de10a55dfc823d48f24ab403 0.005000000000 255338 of 308586 -
02: 9a45bea459178eeebf85c820f665ed511578bc0436379428c96a222fb96bacd8 0.070000000000 200614 of 263947 -
03: a90433a287540d4388b36c3adffa7d34fe3c236b8c79ae25b695d16562ffd458 0.800000000000 413248 of 489955 -
04: 8388b245769af0efb32d231150e0156d66b3c848108de94a47ac0c2e68d739cd 2.000000000000 349538 of 434058 -
05: 1dabca9beaf86084bcf50cb7a69febb93ef0c99fa03634d8eb564e29e4e94f0f 10.000000000000 753191 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer