Monero Transaction d6b0d0a53d2c1156c90affa2848e72715078338aa55a3623991f197256e6b32f

Autorefresh is ON (10 s)

Tx hash: d6b0d0a53d2c1156c90affa2848e72715078338aa55a3623991f197256e6b32f

Tx public key: 72c3b0ebb79776db702f46d3f22a30a29067959b9f89577babf5f3d88c59d1a1

Transaction d6b0d0a53d2c1156c90affa2848e72715078338aa55a3623991f197256e6b32f was carried out on the Monero network on 2014-11-21 17:24:56. The transaction has 2992359 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1416590696 Timestamp [UTC]: 2014-11-21 17:24:56 Age [y:d:h:m:s]: 10:032:01:31:32
Block: 314928 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1680 kB
Tx version: 1 No of confirmations: 2992359 RingCT/type: no
Extra: 0172c3b0ebb79776db702f46d3f22a30a29067959b9f89577babf5f3d88c59d1a102080000000e4c8c36fc

3 output(s) for total of 13.059851482014 xmr

stealth address amount amount idx tag
00: 8101179d1b918941acb5b1c7b1979fab79ce7371e0fb2ed8241dae3b74c2af18 0.059851482014 0 of 1 -
01: 45594384d5563c60345fd95f75af6f442a50e1f10d50de8c2af26da3e11d0d44 3.000000000000 148693 of 300495 -
02: cae2777173c4d487b3868dd6e830c18a2c053d91a848596088b6554ba98507ee 10.000000000000 365965 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer