Monero Transaction 978371b4eba3c0a4dbae4ab6c7fcfb825b0742207103b0ca6ab0d3813e69a39f

Autorefresh is OFF

Tx hash: 978371b4eba3c0a4dbae4ab6c7fcfb825b0742207103b0ca6ab0d3813e69a39f

Tx public key: 16e2888416a4070816903fbad6bd4c19070ed33d7b39d714b04853fc652b90cd

Transaction 978371b4eba3c0a4dbae4ab6c7fcfb825b0742207103b0ca6ab0d3813e69a39f was carried out on the Monero network on 2019-11-19 23:45:04. The transaction has 1324840 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1574207104 Timestamp [UTC]: 2019-11-19 23:45:04 Age [y:d:h:m:s]: 05:016:07:33:02
Block: 1970628 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1006 kB
Tx version: 2 No of confirmations: 1324840 RingCT/type: yes/0
Extra: 0116e2888416a4070816903fbad6bd4c19070ed33d7b39d714b04853fc652b90cd0211000012ab03413b0a000000000000000000

1 output(s) for total of 2.157870802712 xmr

stealth address amount amount idx tag
00: f2dd017213b2592caae34e58183f0d81a559c18bdc8aad438e14d79bc3d2b2e8 2.157870802712 13337886 of 0 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer