Monero Transaction ac55e6f1ef106a9d089c4f9c3f6bfc0caf4674c67f692c6aa189088bad4acca0

Autorefresh is OFF

Tx hash: ac55e6f1ef106a9d089c4f9c3f6bfc0caf4674c67f692c6aa189088bad4acca0

Tx public key: a69ef3e704e952150246ca8bfb7241d52857b33223c4fcab8c99bb9edab4b864

Transaction ac55e6f1ef106a9d089c4f9c3f6bfc0caf4674c67f692c6aa189088bad4acca0 was carried out on the Monero network on 2014-11-23 07:43:21. The transaction has 3033692 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1416728601 Timestamp [UTC]: 2014-11-23 07:43:21 Age [y:d:h:m:s]: 10:090:22:57:10
Block: 317146 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1670 kB
Tx version: 1 No of confirmations: 3033692 RingCT/type: no
Extra: 01a69ef3e704e952150246ca8bfb7241d52857b33223c4fcab8c99bb9edab4b8640208000000012b484fa8

3 output(s) for total of 13.032259078441 xmr

stealth address amount amount idx tag
00: d097600d61f3751363669ef1cf93d748e1624fada49a9d8f0eeaa12712444848 0.032259078441 0 of 1 -
01: fe000b573c66141e707a55006c757afd86655e1ceaaf180e01e12101b09e8509 3.000000000000 151311 of 300495 -
02: cfc80ed924811752582f979456002ee2091f4aacb79e2b4244324f02994cb684 10.000000000000 368428 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer