Monero Transaction ec1b1e0ae5e1a5f42014774c0cdfd6c68f6e05b92a53abeea1b2546307ff2f84

Autorefresh is ON (10 s)

Tx hash: ec1b1e0ae5e1a5f42014774c0cdfd6c68f6e05b92a53abeea1b2546307ff2f84

Tx public key: 5b2cff46c6e85395ec70510351a6c8e514ef189be755e78c1b690373ecb02f88

Transaction ec1b1e0ae5e1a5f42014774c0cdfd6c68f6e05b92a53abeea1b2546307ff2f84 was carried out on the Monero network on 2017-08-31 13:17:44. The transaction has 1934508 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1504185464 Timestamp [UTC]: 2017-08-31 13:17:44 Age [y:d:h:m:s]: 07:135:09:53:37
Block: 1388780 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.0928 kB
Tx version: 2 No of confirmations: 1934508 RingCT/type: yes/0
Extra: 015b2cff46c6e85395ec70510351a6c8e514ef189be755e78c1b690373ecb02f880208001daf8875be729a

1 output(s) for total of 6.661534083519 xmr

stealth address amount amount idx tag
00: 6b1543d7fcd1d6380525078c2b2967545e9395625ca44a0393590fc94c99e677 6.661534083519 2414932 of 0 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer