Monero Transaction e6d6f00166b88a28569e80d3355a76d73b4413a8af32d1a21f2da5a68b9f2055

Autorefresh is OFF

Tx hash: e6d6f00166b88a28569e80d3355a76d73b4413a8af32d1a21f2da5a68b9f2055

Tx public key: b5fe4d505e5db3b9a07a1cc49284bd75318869f26b8fb091ae00217df2a65fec

Transaction e6d6f00166b88a28569e80d3355a76d73b4413a8af32d1a21f2da5a68b9f2055 was carried out on the Monero network on 2016-04-23 18:46:41. The transaction has 2258203 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1461437201 Timestamp [UTC]: 2016-04-23 18:46:41 Age [y:d:h:m:s]: 08:219:15:05:08
Block: 1032220 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1680 kB
Tx version: 1 No of confirmations: 2258203 RingCT/type: no
Extra: 01b5fe4d505e5db3b9a07a1cc49284bd75318869f26b8fb091ae00217df2a65fec020800000014bc000001

3 output(s) for total of 12.904000000000 xmr

stealth address amount amount idx tag
00: bf6219265df2b51828f12451cb84698a17c21b2c1db572a3ad1dec1d226c9447 0.904000000000 1 of 8 -
01: 3518ec6289da1ac974411b63d6d62df371b95205cdec72446d57232e36c6576c 2.000000000000 334911 of 434057 -
02: ada1ac5fe653ddeed1ee8a87a7455dd02e922e2438ccc837c2ecfc136d165106 10.000000000000 738227 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer