Monero Transaction d38f418f6a45559707d0eaf8a69ea2e6aa0aff23423014a2001282611cee3ae3

Autorefresh is ON (10 s)

Tx hash: d38f418f6a45559707d0eaf8a69ea2e6aa0aff23423014a2001282611cee3ae3

Tx public key: d9bc850bb9da93698af8d5948f88f2e29cf3f404ca7138538e929c9c5e4ee916

Transaction d38f418f6a45559707d0eaf8a69ea2e6aa0aff23423014a2001282611cee3ae3 was carried out on the Monero network on 2022-10-07 03:29:53. The transaction has 579514 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1665113393 Timestamp [UTC]: 2022-10-07 03:29:53 Age [y:d:h:m:s]: 02:076:00:44:20
Block: 2728045 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.0947 kB
Tx version: 2 No of confirmations: 579514 RingCT/type: yes/0
Extra: 01d9bc850bb9da93698af8d5948f88f2e29cf3f404ca7138538e929c9c5e4ee91602088f3bfcf452fdfc00

1 output(s) for total of 0.600074940000 xmr

stealth address amount amount idx tag
00: a5804bb947d3253a3dcd31ef7610f7045cfff35dbf7bb6adbabdedf70d5827d9 0.600074940000 62194213 of 0 <70>

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer