Monero Transaction d4764b8d9aa6494199982ec4712c4b6c90e0311cd92dc64e903694635ef6007f

Autorefresh is ON (10 s)

Tx hash: d4764b8d9aa6494199982ec4712c4b6c90e0311cd92dc64e903694635ef6007f

Tx public key: 803be86ab7775ba6d31d7f972d3b6c8d6306d68914a19b7e7b3e74331e74661c

Transaction d4764b8d9aa6494199982ec4712c4b6c90e0311cd92dc64e903694635ef6007f was carried out on the Monero network on 2016-03-04 19:52:33. The transaction has 2319691 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1457121153 Timestamp [UTC]: 2016-03-04 19:52:33 Age [y:d:h:m:s]: 08:286:21:28:46
Block: 983181 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1670 kB
Tx version: 1 No of confirmations: 2319691 RingCT/type: no
Extra: 01803be86ab7775ba6d31d7f972d3b6c8d6306d68914a19b7e7b3e74331e74661c02080000000030000001

3 output(s) for total of 7.063632790635 xmr

stealth address amount amount idx tag
00: fc387100ffce54778ff5dd8aa548f9929bdc8cea81ae1216068b63fc20f63383 0.003632790635 0 of 1 -
01: 6c8ed5df4e9039b950f547f43964263c83255e6d9df16a3f1563088acd49adef 0.060000000000 196783 of 264760 -
02: 6172d8fc68427ec5b8a6df9f50d8a3cb1cfc0a117490e6f7b0d5084e36982d33 7.000000000000 247265 of 285521 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer