Monero Transaction af5613e48aa5470eefec51e3005e37d2e74f6827ed05a4c288915f69a87b8f14

Autorefresh is OFF

Tx hash: af5613e48aa5470eefec51e3005e37d2e74f6827ed05a4c288915f69a87b8f14

Tx public key: 4c687a0a9fddd8e9b0502039acc14f90cfb901ec219d94fa9668a4d3402b091f

Transaction af5613e48aa5470eefec51e3005e37d2e74f6827ed05a4c288915f69a87b8f14 was carried out on the Monero network on 2016-01-16 07:51:32. The transaction has 2387898 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1452930692 Timestamp [UTC]: 2016-01-16 07:51:32 Age [y:d:h:m:s]: 08:334:16:21:41
Block: 914465 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1680 kB
Tx version: 1 No of confirmations: 2387898 RingCT/type: no
Extra: 014c687a0a9fddd8e9b0502039acc14f90cfb901ec219d94fa9668a4d3402b091f020800000093fdc8ae87

3 output(s) for total of 7.374047065676 xmr

stealth address amount amount idx tag
00: aada17c69915d96f718c53671d173ff473519d044dc86ed4ac1cdd55672ec442 0.074047065676 0 of 1 -
01: aba2ff40f04c9838f59a3d351746a31da29e967d5759d9faeeb50b5de0c355e5 0.300000000000 757054 of 976536 -
02: c4e86f05774e4e99d96c793c9a5542af79b832cd8e4e48fe17cbf19388ace47b 7.000000000000 184379 of 285521 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer