Monero Transaction e6e4f93aaa5319508733b3fa67ef447a7d60a46bc42dc12dce5f095ab75ab52c

Autorefresh is ON (10 s)

Tx hash: e6e4f93aaa5319508733b3fa67ef447a7d60a46bc42dc12dce5f095ab75ab52c

Tx public key: 66fea4dda6c6ab41e5c309be4529a2727dec23bb6d58f607a693ec26718f99b7

Transaction e6e4f93aaa5319508733b3fa67ef447a7d60a46bc42dc12dce5f095ab75ab52c was carried out on the Monero network on 2023-08-23 01:12:12. The transaction has 351904 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1692753132 Timestamp [UTC]: 2023-08-23 01:12:12 Age [y:d:h:m:s]: 01:124:03:03:17
Block: 2957830 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.0947 kB
Tx version: 2 No of confirmations: 351904 RingCT/type: yes/0
Extra: 0166fea4dda6c6ab41e5c309be4529a2727dec23bb6d58f607a693ec26718f99b7020817835317d6cc2a00

1 output(s) for total of 0.611636820000 xmr

stealth address amount amount idx tag
00: 3cc415f84c116c78dc2a0dc53f3a8f7f1b3782cd26d798798d5ca46ab89681a7 0.611636820000 78990442 of 0 <61>

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer