Monero Transaction d16b253e0aa337a6a6e07123958d6445b4e96dfb4136e478df8e9146a45c2d4a

Autorefresh is ON (10 s)

Tx hash: d16b253e0aa337a6a6e07123958d6445b4e96dfb4136e478df8e9146a45c2d4a

Tx public key: 88faa695ce66781c0205d756b1050de6fc33240e6f9eeec4d93f3130e03229e9

Transaction d16b253e0aa337a6a6e07123958d6445b4e96dfb4136e478df8e9146a45c2d4a was carried out on the Monero network on 2016-06-12 21:30:33. The transaction has 2248869 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1465767033 Timestamp [UTC]: 2016-06-12 21:30:33 Age [y:d:h:m:s]: 08:206:13:46:20
Block: 1068259 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1680 kB
Tx version: 1 No of confirmations: 2248869 RingCT/type: no
Extra: 0188faa695ce66781c0205d756b1050de6fc33240e6f9eeec4d93f3130e03229e902080000001791000001

3 output(s) for total of 12.046900000000 xmr

stealth address amount amount idx tag
00: 08cf63b58cbc5d11d26a049188937358b5ae0747c7cb586f300c43fd7f78a05f 0.046900000000 3 of 8 -
01: a4bf94883149b0cb160047a0debe90f539c997c439b5bbd8cdcb313d73177f33 2.000000000000 377041 of 434058 -
02: 9879726659a476917b15c099e0fda3aeb5862ccb602d0e0c674f8c6a2a5b407d 10.000000000000 780050 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer