Monero Transaction ef05a7226e208036b3c729839861e33d28f7c043a4a6080e3eb2f2e34dd3d2d7

Autorefresh is OFF

Tx hash: ef05a7226e208036b3c729839861e33d28f7c043a4a6080e3eb2f2e34dd3d2d7

Tx public key: 079d6bab342dce357e4d7e74a9a0ceca557eb3678e90316f0536702b1400a704

Transaction ef05a7226e208036b3c729839861e33d28f7c043a4a6080e3eb2f2e34dd3d2d7 was carried out on the Monero network on 2023-11-13 20:04:46. The transaction has 333044 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1699905886 Timestamp [UTC]: 2023-11-13 20:04:46 Age [y:d:h:m:s]: 01:097:19:08:09
Block: 3017408 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.0947 kB
Tx version: 2 No of confirmations: 333044 RingCT/type: yes/0
Extra: 01079d6bab342dce357e4d7e74a9a0ceca557eb3678e90316f0536702b1400a7040208ae234d8aa2775600

1 output(s) for total of 0.602714620000 xmr

stealth address amount amount idx tag
00: 11862a27784f1318b5bd0e3a5c22e8986f0b58de1e84374621928f84f0232c27 0.602714620000 83525347 of 0 <0c>

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer