Monero Transaction e0ef4aee55f5f4e9feec3c7c0270221d15572a0fec5c7e06d29c5572910a14bb

Autorefresh is OFF

Tx hash: e0ef4aee55f5f4e9feec3c7c0270221d15572a0fec5c7e06d29c5572910a14bb

Tx public key: a19a2e5a621ba2a9e629f7c20d2bd62d81b31dddc291361d7e635de5f34c43be

Transaction e0ef4aee55f5f4e9feec3c7c0270221d15572a0fec5c7e06d29c5572910a14bb was carried out on the Monero network on 2015-12-24 17:11:18. The transaction has 2423285 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1450977078 Timestamp [UTC]: 2015-12-24 17:11:18 Age [y:d:h:m:s]: 08:362:03:22:08
Block: 882597 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1670 kB
Tx version: 1 No of confirmations: 2423285 RingCT/type: no
Extra: 01a19a2e5a621ba2a9e629f7c20d2bd62d81b31dddc291361d7e635de5f34c43be020800000001fe2cc56a

3 output(s) for total of 7.601539069051 xmr

stealth address amount amount idx tag
00: a9c7a9a33886917c309333e6bd85643a5bd74db75be43a5dbdfa9abde08f4e78 0.001539069051 0 of 1 -
01: 4a815d03188fb22b7f43e9f0020e604cca5def1a34c63a076caa89d08f8254ab 0.600000000000 532990 of 650760 -
02: 5dd56d94bf5c637b4049c8432d619153b8d35111f01dfc2894f14ddc8cb90d22 7.000000000000 149283 of 285521 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer