Monero Transaction e13eb954b52adfbef0e24d36e1dd244e4a93b60c5a76c2612464fea6fda83384

Autorefresh is ON (10 s)

Tx hash: e13eb954b52adfbef0e24d36e1dd244e4a93b60c5a76c2612464fea6fda83384

Tx public key: ecea92aef78fa201170c4c269f0de2395e8d930cf378c97804e59f123388d4a6

Transaction e13eb954b52adfbef0e24d36e1dd244e4a93b60c5a76c2612464fea6fda83384 was carried out on the Monero network on 2015-12-15 00:05:40. The transaction has 2437258 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1450137940 Timestamp [UTC]: 2015-12-15 00:05:40 Age [y:d:h:m:s]: 09:007:02:43:33
Block: 868788 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1670 kB
Tx version: 1 No of confirmations: 2437258 RingCT/type: no
Extra: 01ecea92aef78fa201170c4c269f0de2395e8d930cf378c97804e59f123388d4a6020800000001559ded01

3 output(s) for total of 7.702287195887 xmr

stealth address amount amount idx tag
00: a506a7dafa5805e97862ad0e50919e9a92a9b9db17eb4cb6ceae2b6f06b34020 0.002287195887 0 of 1 -
01: 9abbbf9a9ef64046e196a3d0c78d44e3bb9e87cefca4923402ee12975e815ac3 0.700000000000 398898 of 514467 -
02: f56a806c2aeac3d12d95e771e271e64973a73079f7c4361c73ee014eed2120bc 7.000000000000 134170 of 285521 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer