Monero Transaction a73f5a0e45d7980470bcd1ea6bd0d7038d524c2868ea2eeeb3b919e36922aae5

Autorefresh is OFF

Tx hash: a73f5a0e45d7980470bcd1ea6bd0d7038d524c2868ea2eeeb3b919e36922aae5

Tx public key: c0f86ac08bb3e29e4f2bbe75e7b12b224832542047709e25a957af4207f1cd91

Transaction a73f5a0e45d7980470bcd1ea6bd0d7038d524c2868ea2eeeb3b919e36922aae5 was carried out on the Monero network on 2014-11-24 08:06:44. The transaction has 2988809 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1416816404 Timestamp [UTC]: 2014-11-24 08:06:44 Age [y:d:h:m:s]: 10:029:13:46:06
Block: 318567 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.2051 kB
Tx version: 1 No of confirmations: 2988809 RingCT/type: no
Extra: 01c0f86ac08bb3e29e4f2bbe75e7b12b224832542047709e25a957af4207f1cd9102080000000012572c5f0000000000000000000000000000000000000000000000000000000000000000000000000000

3 output(s) for total of 13.092603253922 xmr

stealth address amount amount idx tag
00: b7e01c8c56332957c481356917f9ba04987d0c8ac423b265ed5f459199ec69ad 0.092603253922 0 of 1 -
01: 0b8edd23a05be57bd990be01d0857ad77ea2f38265be08a838b5f42dc958c787 3.000000000000 153017 of 300495 -
02: 873612bb6087d15d9aa12eaafd60e8385bf780de8297fa8bd116e7bb46daf61f 10.000000000000 370026 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer