Monero Transaction df202579a35a06d0b6d1e37748eb5df28d8092ce5fe7861a0eaedd60feea0b9e

Autorefresh is OFF

Tx hash: df202579a35a06d0b6d1e37748eb5df28d8092ce5fe7861a0eaedd60feea0b9e

Tx public key: 996f0d58d263d44d51654816ba585eb4d9df03bc538988348a847a971a7b35cc

Transaction df202579a35a06d0b6d1e37748eb5df28d8092ce5fe7861a0eaedd60feea0b9e was carried out on the Monero network on 2014-06-25 23:51:36. The transaction has 3140184 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1403740296 Timestamp [UTC]: 2014-06-25 23:51:36 Age [y:d:h:m:s]: 10:089:18:40:54
Block: 101606 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1680 kB
Tx version: 1 No of confirmations: 3140184 RingCT/type: no
Extra: 01996f0d58d263d44d51654816ba585eb4d9df03bc538988348a847a971a7b35cc02080000001e16647933

3 output(s) for total of 16.001571679777 xmr

stealth address amount amount idx tag
00: 84f7c58d14b04772cc089106f39490842f0843a65d61d3cb205e797996412a3f 0.001571679777 0 of 1 -
01: f161898480718b15b438cfce6f6e6c25af23c96c069ff9e97e05da1df140b6d5 6.000000000000 64854 of 207703 -
02: f53cc81c9e502e252af6aff37ee740f77fb2f4526a57da2ef4c19e5be48fdc02 10.000000000000 111365 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer