Monero Transaction ec4aee9ac0e4cc682ee8d06b25f7db92be8f3e6875554a9a8b10681d5a61f1a3

Autorefresh is ON (10 s)

Tx hash: ec4aee9ac0e4cc682ee8d06b25f7db92be8f3e6875554a9a8b10681d5a61f1a3

Tx public key: 1d2f2d5f63370771a5db2594d779034665f1f79d815e007ab81821c65914b7e4

Transaction ec4aee9ac0e4cc682ee8d06b25f7db92be8f3e6875554a9a8b10681d5a61f1a3 was carried out on the Monero network on 2015-06-30 11:00:49. The transaction has 2677403 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1435662049 Timestamp [UTC]: 2015-06-30 11:00:49 Age [y:d:h:m:s]: 09:177:04:18:50
Block: 630478 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1680 kB
Tx version: 1 No of confirmations: 2677403 RingCT/type: no
Extra: 011d2f2d5f63370771a5db2594d779034665f1f79d815e007ab81821c65914b7e4020800000003e63da620

3 output(s) for total of 9.667104554668 xmr

stealth address amount amount idx tag
00: 48c367d6aaef45967962cfe9260edadbeba223faea31489c8cc94efb87685022 0.067104554668 0 of 1 -
01: 1c21be53fe3f3fe180cbe5012967185ae39e4d6eff9d1f7f38a93cf2fffa9eb3 0.600000000000 448319 of 650760 -
02: da39cd4931bd516fd2a734f58b1c8cd294bcd8311bf5decb3c32e0f3535e388d 9.000000000000 81331 of 274259 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer