Monero Transaction e5066a96c9bd81ec38d32b5ee14f610a3e0ab83946cd80ada67999e5c65b8872

Autorefresh is ON (10 s)

Tx hash: e5066a96c9bd81ec38d32b5ee14f610a3e0ab83946cd80ada67999e5c65b8872

Tx public key: e3cd23d236d7bcbb60675b95d9bf3c10cfa21424f1c2e5cdd44b6ef99031d316

Transaction e5066a96c9bd81ec38d32b5ee14f610a3e0ab83946cd80ada67999e5c65b8872 was carried out on the Monero network on 2016-05-10 20:58:56. The transaction has 2243474 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1462913936 Timestamp [UTC]: 2016-05-10 20:58:56 Age [y:d:h:m:s]: 08:199:01:28:31
Block: 1044497 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1680 kB
Tx version: 1 No of confirmations: 2243474 RingCT/type: no
Extra: 01e3cd23d236d7bcbb60675b95d9bf3c10cfa21424f1c2e5cdd44b6ef99031d31602080000000013000001

3 output(s) for total of 12.605400000000 xmr

stealth address amount amount idx tag
00: 2f96c21d299efc91c135875db602dc67b0371c8407923e748acea29bab5deb87 0.605400000000 0 of 3 -
01: 66139be32001b9075d386f2f42492b9a6e66cd9ff763707e17e8dfab637d52fd 2.000000000000 349073 of 434057 -
02: 307c8d6267c18e9a433b7fba654d0d076619ce092de9ee79f9f4c4e63bd2affa 10.000000000000 752737 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer