Monero Transaction e131442cb5c9ed3c48226f900fd3af74afb581e4e3a6891063297a90b306f07f

Autorefresh is ON (10 s)

Tx hash: e131442cb5c9ed3c48226f900fd3af74afb581e4e3a6891063297a90b306f07f

Tx public key: 2d302cf62f59d60f6014d48bbd3bfa134f6f36f00404d6af0d5e74fe0a31cc40

Transaction e131442cb5c9ed3c48226f900fd3af74afb581e4e3a6891063297a90b306f07f was carried out on the Monero network on 2019-08-22 12:40:33. The transaction has 1407887 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1566477633 Timestamp [UTC]: 2019-08-22 12:40:33 Age [y:d:h:m:s]: 05:131:23:47:27
Block: 1906409 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.0918 kB
Tx version: 2 No of confirmations: 1407887 RingCT/type: yes/0
Extra: 012d302cf62f59d60f6014d48bbd3bfa134f6f36f00404d6af0d5e74fe0a31cc4002080000003d33040000

1 output(s) for total of 2.441040285154 xmr

stealth address amount amount idx tag
00: 2284f6b72e21ed37c66d8377064c0af1a9afdb6ee3cf5b7487f1117b117bee7b 2.441040285154 11964101 of 0 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer