Monero Transaction ec52285e0ea0832926e2e4f68e89c2a3a130e3b3e4df6963e1ca5aa7749d9c29

Autorefresh is OFF

Tx hash: ec52285e0ea0832926e2e4f68e89c2a3a130e3b3e4df6963e1ca5aa7749d9c29

Tx public key: f5c22454ef5de6153f7f82ef171dc0fb917ac992a907b322d34a76b988e9cebb

Transaction ec52285e0ea0832926e2e4f68e89c2a3a130e3b3e4df6963e1ca5aa7749d9c29 was carried out on the Monero network on 2014-11-25 01:57:54. The transaction has 2976365 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1416880674 Timestamp [UTC]: 2014-11-25 01:57:54 Age [y:d:h:m:s]: 10:012:23:17:18
Block: 319600 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1670 kB
Tx version: 1 No of confirmations: 2976365 RingCT/type: no
Extra: 01f5c22454ef5de6153f7f82ef171dc0fb917ac992a907b322d34a76b988e9cebb0208000000002ef9f889

3 output(s) for total of 13.001805474692 xmr

stealth address amount amount idx tag
00: 7721d9dad0855bbd97fd2fe8be27ae69d58e5ac43dcbff6f9a0863a40c584bbf 0.001805474692 0 of 1 -
01: 091ffc759c3950646bded95ec03275abb193e29448bf777829d26757dbe004fa 3.000000000000 154249 of 300495 -
02: 01c28c21245d9de7d6f47b2c6337b90c7a64eb5e37e4430a8e3cebff3238df15 10.000000000000 371222 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer