Monero Transaction a52b0e81e5c1050ab20d5f365f5002fafa0cb7414b43171f5cec994fc082caf3

Autorefresh is ON (10 s)

Tx hash: a52b0e81e5c1050ab20d5f365f5002fafa0cb7414b43171f5cec994fc082caf3

Tx public key: 92ea5f37ec845bc96d82e1c0838911d19f3cb87cadd3bb0021468775da275b84

Transaction a52b0e81e5c1050ab20d5f365f5002fafa0cb7414b43171f5cec994fc082caf3 was carried out on the Monero network on 2019-06-26 02:46:39. The transaction has 1447612 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1561517199 Timestamp [UTC]: 2019-06-26 02:46:39 Age [y:d:h:m:s]: 05:187:04:08:52
Block: 1865077 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1006 kB
Tx version: 2 No of confirmations: 1447612 RingCT/type: yes/0
Extra: 0192ea5f37ec845bc96d82e1c0838911d19f3cb87cadd3bb0021468775da275b840211000007efc2760e38000000010000030500

1 output(s) for total of 2.639657494188 xmr

stealth address amount amount idx tag
00: 04893118e5d2a5b045e18359cd47119fc7b62ddef8758e43dbdbf79aa8a31f0d 2.639657494188 11040210 of 0 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer