Monero Transaction ec654b34b5a1b21e2034ea9a84af8b684b7164bec3eb649cafb07397347d0691

Autorefresh is ON (10 s)

Tx hash: ec654b34b5a1b21e2034ea9a84af8b684b7164bec3eb649cafb07397347d0691

Tx public key: 1e9bcd8349113783de7d463427b7d2d58c45e7e1efa2f4c6e435394800fbda91

Transaction ec654b34b5a1b21e2034ea9a84af8b684b7164bec3eb649cafb07397347d0691 was carried out on the Monero network on 2014-11-22 13:09:01. The transaction has 2989178 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1416661741 Timestamp [UTC]: 2014-11-22 13:09:01 Age [y:d:h:m:s]: 10:028:10:39:37
Block: 316080 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1680 kB
Tx version: 1 No of confirmations: 2989178 RingCT/type: no
Extra: 011e9bcd8349113783de7d463427b7d2d58c45e7e1efa2f4c6e435394800fbda9102080000000139b0dd33

3 output(s) for total of 13.045512642323 xmr

stealth address amount amount idx tag
00: 35e0ca2a3f4a09740c016ac3ed377a9e12673eb42000b853d61e7203d73657a5 0.045512642323 0 of 1 -
01: ecf697d0a3a149ff8dcb9528a28c0eaa242e1c88011396f617186a555b78d4f6 3.000000000000 150054 of 300495 -
02: 5b792cdd8edecb2a7dc67478cddecf2e3b71cd01edebcaaeadde364285712e89 10.000000000000 367241 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer