Monero Transaction e5d2d99dbb220a8852e89004832f228fef6348cfb347ea76b2f20709e0b2a408

Autorefresh is OFF

Tx hash: e5d2d99dbb220a8852e89004832f228fef6348cfb347ea76b2f20709e0b2a408

Tx public key: ff1fd96d3a79cef24a91710d10d8e229bac9ee32dfd9c9c7eb08f56b3002e68f

Transaction e5d2d99dbb220a8852e89004832f228fef6348cfb347ea76b2f20709e0b2a408 was carried out on the Monero network on 2016-04-17 17:45:42. The transaction has 2259181 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1460915142 Timestamp [UTC]: 2016-04-17 17:45:42 Age [y:d:h:m:s]: 08:220:21:13:55
Block: 1027831 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1670 kB
Tx version: 1 No of confirmations: 2259181 RingCT/type: no
Extra: 01ff1fd96d3a79cef24a91710d10d8e229bac9ee32dfd9c9c7eb08f56b3002e68f020800000002a6000001

3 output(s) for total of 13.012400000000 xmr

stealth address amount amount idx tag
00: 6f04c1d47375b700598523189c6a36ec800a0a7d4525f921e0be00832402e7cc 0.012400000000 1 of 5 -
01: 81938270cda8c4082bea56aec21269483f4bc4a34f05320c9ae3cd5823d5d647 3.000000000000 252804 of 300495 -
02: 9d289f24a8abfa06551901052f9e088e2b558cfdbf0c958f39f2fa033e96cad8 10.000000000000 733134 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer