Monero Transaction e9ba66ec71be796060db1046e3c0dd9d32ebd6ce873ad4b4c0564a6447b19c66

Autorefresh is ON (10 s)

Tx hash: e9ba66ec71be796060db1046e3c0dd9d32ebd6ce873ad4b4c0564a6447b19c66

Tx public key: 2878078d3da9109c7c95b9d50a2d03f666e2bf8d2d711ccefc25be59cbf851a1

Transaction e9ba66ec71be796060db1046e3c0dd9d32ebd6ce873ad4b4c0564a6447b19c66 was carried out on the Monero network on 2015-12-15 05:08:27. The transaction has 2419790 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1450156107 Timestamp [UTC]: 2015-12-15 05:08:27 Age [y:d:h:m:s]: 08:347:21:05:11
Block: 869036 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1670 kB
Tx version: 1 No of confirmations: 2419790 RingCT/type: no
Extra: 012878078d3da9109c7c95b9d50a2d03f666e2bf8d2d711ccefc25be59cbf851a1020800000000df000001

3 output(s) for total of 7.700467020564 xmr

stealth address amount amount idx tag
00: 83ab7089e17fc47524320519da2bd0903b2da5ea20beee65ae9158ce273ac569 0.000467020564 0 of 1 -
01: c1b5b856016eab262d6dfd99c2bf84633a09e20b84c0037f71b053841395611b 0.700000000000 399245 of 514467 -
02: b5cb8b3c219505c17dbe2d6d17095faabab8a12e97e7fa01011b833b1582e73e 7.000000000000 134492 of 285521 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer