Monero Transaction efb0a1018922df23c0a935bcec4a4aba4b73cbeb7a6550d42fa621e4f0fdb2c4

Autorefresh is OFF

Tx hash: efb0a1018922df23c0a935bcec4a4aba4b73cbeb7a6550d42fa621e4f0fdb2c4

Tx public key: 766074451444c96c422cf2997822e2caa708fa82c376b3ac1a0852d09278037a

Transaction efb0a1018922df23c0a935bcec4a4aba4b73cbeb7a6550d42fa621e4f0fdb2c4 was carried out on the Monero network on 2019-04-20 13:07:21. The transaction has 1489496 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1555765641 Timestamp [UTC]: 2019-04-20 13:07:21 Age [y:d:h:m:s]: 05:245:09:20:58
Block: 1817176 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1006 kB
Tx version: 2 No of confirmations: 1489496 RingCT/type: yes/0
Extra: 01766074451444c96c422cf2997822e2caa708fa82c376b3ac1a0852d09278037a0211000000e52958e000000000000000000000

1 output(s) for total of 2.892143666052 xmr

stealth address amount amount idx tag
00: ba3c314eafebd5221c1f2dc6d19697ac2a7988dbeb2da8eda7dbad7d3b05737a 2.892143666052 9488720 of 0 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer