Monero Transaction e64e4da563fd7f6d20d05cff57954a1c0ef9259f35759d862f00de4bf768547e

Autorefresh is OFF

Tx hash: e64e4da563fd7f6d20d05cff57954a1c0ef9259f35759d862f00de4bf768547e

Tx public key: beb99cf728e8e6976f95d5d19a24d9ebdaf52e4c96ff47617c27b5e1983c2ccf

Transaction e64e4da563fd7f6d20d05cff57954a1c0ef9259f35759d862f00de4bf768547e was carried out on the Monero network on 2018-11-19 20:45:21. The transaction has 1622774 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1542660321 Timestamp [UTC]: 2018-11-19 20:45:21 Age [y:d:h:m:s]: 06:066:13:15:27
Block: 1708729 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.0918 kB
Tx version: 2 No of confirmations: 1622774 RingCT/type: yes/0
Extra: 01beb99cf728e8e6976f95d5d19a24d9ebdaf52e4c96ff47617c27b5e1983c2ccf02080000011e15060000

1 output(s) for total of 3.556161621765 xmr

stealth address amount amount idx tag
00: bb52f1cd8312b5d4525def2c7169b6af6a021f266ca1d97ba1b31ba4bd508014 3.556161621765 7943029 of 0 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer