Monero Transaction e134eef7288db52ae3ac6777bfb7e6da39a74d1ec250e15dba38307a0dfbb9be

Autorefresh is OFF

Tx hash: e134eef7288db52ae3ac6777bfb7e6da39a74d1ec250e15dba38307a0dfbb9be

Tx public key: e5a5b051eebd425c03f0e24a8154ff8f82efd56a906e20275e4e765a79160912

Transaction e134eef7288db52ae3ac6777bfb7e6da39a74d1ec250e15dba38307a0dfbb9be was carried out on the Monero network on 2020-04-08 09:25:29. The transaction has 1234415 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1586337929 Timestamp [UTC]: 2020-04-08 09:25:29 Age [y:d:h:m:s]: 04:256:09:06:39
Block: 2072141 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1104 kB
Tx version: 2 No of confirmations: 1234415 RingCT/type: yes/0
Extra: 01e5a5b051eebd425c03f0e24a8154ff8f82efd56a906e20275e4e765a79160912021b6d696e65786d722e636f6d5d020000000000040000000000000000

1 output(s) for total of 1.778202361096 xmr

stealth address amount amount idx tag
00: afcf35447732c340c6c9d91a079abd571f0113b9945423bbaa48c7809d00736e 1.778202361096 16157851 of 0 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer