Monero Transaction f56ea9da99fe5820ee50d6bf80a35c3fa276a9bc53d8f131619ca36ebfc6f3ea

Autorefresh is ON (10 s)

Tx hash: f56ea9da99fe5820ee50d6bf80a35c3fa276a9bc53d8f131619ca36ebfc6f3ea

Tx public key: 16d513220cee86a4294b27fc736499aa47b0c978a4f51628a41c684753800116

Transaction f56ea9da99fe5820ee50d6bf80a35c3fa276a9bc53d8f131619ca36ebfc6f3ea was carried out on the Monero network on 2015-08-06 04:46:41. The transaction has 2618247 confirmations. Total output fee is 0.000000000000 XMR.

Timestamp: 1438836401 Timestamp [UTC]: 2015-08-06 04:46:41 Age [y:d:h:m:s]: 09:131:00:14:58
Block: 682830 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1680 kB
Tx version: 1 No of confirmations: 2618247 RingCT/type: no
Extra: 0116d513220cee86a4294b27fc736499aa47b0c978a4f51628a41c684753800116020800000000033992c4

3 output(s) for total of 9.196431305318 xmr

stealth address amount amount idx tag
00: 41dc44b27c690deb35d6851fed685bb125b81a35011f6c6b6f801990bac51146 0.096431305318 0 of 1 -
01: 6dba5bdd2b1801ff43d1d6a101a4ece04b7a7ed0eb7bfb1af6a46850ec6a8068 0.100000000000 783971 of 982315 -
02: ffa7d939039aaab24e111b0bb90d918c8ec435b4a715e476faf757aa869411e9 9.000000000000 138015 of 274259 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | moneroexplorer