Monero Transaction a56f78d2c42a4d310a7852cbbdb082d14b917837cbe4643d22b26fdbdd602305

Autorefresh is ON (10 s)

Tx hash: a56f78d2c42a4d310a7852cbbdb082d14b917837cbe4643d22b26fdbdd602305

Tx public key: ce72d46c23266fc09a8c9edeb5b30d483516d275cd375fea25b2637a98683df4

Transaction a56f78d2c42a4d310a7852cbbdb082d14b917837cbe4643d22b26fdbdd602305 was carried out on the Monero network on 2019-12-29 11:44:41. The transaction has 1311335 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1577619881 Timestamp [UTC]: 2019-12-29 11:44:41 Age [y:d:h:m:s]: 04:363:03:44:50
Block: 1999461 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1104 kB
Tx version: 2 No of confirmations: 1311335 RingCT/type: yes/0
Extra: 01ce72d46c23266fc09a8c9edeb5b30d483516d275cd375fea25b2637a98683df4021b6d696e65786d722e636f6d16030000000001100000000000000000

1 output(s) for total of 2.042185996792 xmr

stealth address amount amount idx tag
00: 5d155df65f69c507d926536a3179c0afb94c36f5165471f341b493d0f19816ab 2.042185996792 14001281 of 0 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer