Monero Transaction e42f42e831e39c8007d5f3e8bb403a0ffda67167bc12f00ed1bdff554c082c34

Autorefresh is OFF

Tx hash: e42f42e831e39c8007d5f3e8bb403a0ffda67167bc12f00ed1bdff554c082c34

Tx public key: 38bc430f4b968c49b642fd9a74f2f56c63d1a4d16f9ca9f14c3b15b4ae95aeb9

Transaction e42f42e831e39c8007d5f3e8bb403a0ffda67167bc12f00ed1bdff554c082c34 was carried out on the Monero network on 2016-07-15 13:18:42. The transaction has 2212260 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1468588722 Timestamp [UTC]: 2016-07-15 13:18:42 Age [y:d:h:m:s]: 08:155:21:10:17
Block: 1091864 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1680 kB
Tx version: 1 No of confirmations: 2212260 RingCT/type: no
Extra: 0138bc430f4b968c49b642fd9a74f2f56c63d1a4d16f9ca9f14c3b15b4ae95aeb902080000000915000001

3 output(s) for total of 11.516700000000 xmr

stealth address amount amount idx tag
00: 75a63411ba55ffaebc96243155a501185d2068131cffc63545ccab50839db1be 0.516700000000 1 of 3 -
01: ae2d8d11d90747c64ed94c5ed0ca3deeb654cfa8925c5d05737c5923d2f56e92 1.000000000000 743160 of 874630 -
02: 878589496c8b4fe344bacb01240d2f7e754ac8ef709719e68fe005dd8716577e 10.000000000000 807867 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer