Monero Transaction e2aec1ccfb4bdf730e1dbe47ddbfee523e5ed02b06567f2b000c4daed3539e2a

Autorefresh is OFF

Tx hash: e2aec1ccfb4bdf730e1dbe47ddbfee523e5ed02b06567f2b000c4daed3539e2a

Tx public key: b139d708c31e988c3228fb555d07f8d21056a91fe57abde7738c69f1e460c678

Transaction e2aec1ccfb4bdf730e1dbe47ddbfee523e5ed02b06567f2b000c4daed3539e2a was carried out on the Monero network on 2019-09-12 20:19:39. The transaction has 1382080 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1568319579 Timestamp [UTC]: 2019-09-12 20:19:39 Age [y:d:h:m:s]: 05:096:04:02:46
Block: 1921729 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1006 kB
Tx version: 2 No of confirmations: 1382080 RingCT/type: yes/0
Extra: 01b139d708c31e988c3228fb555d07f8d21056a91fe57abde7738c69f1e460c6780211000002b603413b0a000000000000000000

1 output(s) for total of 2.368988476201 xmr

stealth address amount amount idx tag
00: f958bb876f28c44ca0eb77ebd43c185a055fe7016bf5a2c27e276f57d98f6887 2.368988476201 12301540 of 0 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer