Monero Transaction aef383c2e30d5e2b5ed16c7ae167b8e0f8e9b2bc675a8158d84a75d0d3dc6984

Autorefresh is ON (10 s)

Tx hash: aef383c2e30d5e2b5ed16c7ae167b8e0f8e9b2bc675a8158d84a75d0d3dc6984

Tx public key: d6b9057673b0a75631b010e161fda8dc95fd303c3973647cd0c656868bbdf828

Transaction aef383c2e30d5e2b5ed16c7ae167b8e0f8e9b2bc675a8158d84a75d0d3dc6984 was carried out on the Monero network on 2016-10-25 16:48:33. The transaction has 2136290 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1477414113 Timestamp [UTC]: 2016-10-25 16:48:33 Age [y:d:h:m:s]: 08:050:04:44:05
Block: 1165343 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1660 kB
Tx version: 1 No of confirmations: 2136290 RingCT/type: no
Extra: 01d6b9057673b0a75631b010e161fda8dc95fd303c3973647cd0c656868bbdf8280208000000000c94d8e8

3 output(s) for total of 10.011000000000 xmr

stealth address amount amount idx tag
00: 58837d7910d6e6e2a9bd850fae84d274eda84b991476fa00958e135408535b34 0.001000000000 72850 of 100400 -
01: 78d8172af35d5b642c195d6f39b7be93db487371d4481e475049a7edbc980919 0.010000000000 468759 of 502466 -
02: b2ff66c7f25708ac646bcaa48d2806c8e6c411066edfaa86913513f0e5e4915f 10.000000000000 902283 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer