Monero Transaction c2b01c552e61722b79983af374db56fe58192c0268899ae33e15ae6f3ae053b4

Autorefresh is ON (10 s)

Tx hash: c2b01c552e61722b79983af374db56fe58192c0268899ae33e15ae6f3ae053b4

Tx public key: ceb6fd0b27d5a3c73c0dc1fb380121ee7724db4b633b800959e5da7f7f70daa5

Transaction c2b01c552e61722b79983af374db56fe58192c0268899ae33e15ae6f3ae053b4 was carried out on the Monero network on 2019-02-05 00:59:49. The transaction has 1547220 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1549328389 Timestamp [UTC]: 2019-02-05 00:59:49 Age [y:d:h:m:s]: 05:326:16:26:06
Block: 1764351 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.0918 kB
Tx version: 2 No of confirmations: 1547220 RingCT/type: yes/0
Extra: 01ceb6fd0b27d5a3c73c0dc1fb380121ee7724db4b633b800959e5da7f7f70daa50208000000d65b040000

1 output(s) for total of 3.197877968172 xmr

stealth address amount amount idx tag
00: b5a81e95cf0829470d2d26728b0fb0543dee6ca23e70f0d1415cf3d5be7d2a2b 3.197877968172 8763220 of 0 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer