Monero Transaction e4a5e816a06aa3a6daa8e9d5fd6ad85fedb65c198f4026dad0c048d39786c5e6

Autorefresh is ON (10 s)

Tx hash: e4a5e816a06aa3a6daa8e9d5fd6ad85fedb65c198f4026dad0c048d39786c5e6

Tx public key: ff1fe5cf3e60968ea4ebc27feaddf5717bb522e1f3a44a0d1f65311912e823cd

Transaction e4a5e816a06aa3a6daa8e9d5fd6ad85fedb65c198f4026dad0c048d39786c5e6 was carried out on the Monero network on 2016-06-18 13:00:44. The transaction has 2229994 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1466254844 Timestamp [UTC]: 2016-06-18 13:00:44 Age [y:d:h:m:s]: 08:180:08:55:40
Block: 1072303 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1680 kB
Tx version: 1 No of confirmations: 2229994 RingCT/type: no
Extra: 01ff1fe5cf3e60968ea4ebc27feaddf5717bb522e1f3a44a0d1f65311912e823cd02080000000136000001

3 output(s) for total of 12.131900000000 xmr

stealth address amount amount idx tag
00: 99a6cd9eb8cd2c7bb13e2f52ea6beab80cc451978022abe68d9badd933c25f30 0.131900000000 0 of 2 -
01: ecfe36233b9ef313092d9dd11fb1512621e111a056653c04b334cda0f63522f1 2.000000000000 380711 of 434058 -
02: be1bfd1ae476e5dd06f4f681f2c59a231e8178879625c52e104117920007f73b 10.000000000000 784892 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer