Monero Transaction ca1506e05a2cc5bfdc9fface79efbc2972ab1bd452371d0c2a49fa1b4889e6f4

Autorefresh is OFF

Tx hash: ca1506e05a2cc5bfdc9fface79efbc2972ab1bd452371d0c2a49fa1b4889e6f4

Tx public key: 1416748777ffcb4e592e8f89ac0d98e4ae227cb1e0f4818e30e7182545fd91e8

Transaction ca1506e05a2cc5bfdc9fface79efbc2972ab1bd452371d0c2a49fa1b4889e6f4 was carried out on the Monero network on 2020-01-04 01:04:56. The transaction has 1328013 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1578099896 Timestamp [UTC]: 2020-01-04 01:04:56 Age [y:d:h:m:s]: 05:021:09:50:42
Block: 2003512 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1006 kB
Tx version: 2 No of confirmations: 1328013 RingCT/type: yes/0
Extra: 011416748777ffcb4e592e8f89ac0d98e4ae227cb1e0f4818e30e7182545fd91e802110000005010e074ac000000000000000000

1 output(s) for total of 2.026678527356 xmr

stealth address amount amount idx tag
00: 79a5580a58561a725f4e3723eee249bab9dec1cd054cbea58f8e8f3bf6cc6b04 2.026678527356 14106966 of 0 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer