Monero is a secure, untraceable and resilient digital currency. We believe it is the successor to Bitcoin. Read why.

How to Prove a Monero Payment (Command Line Wallet)

Last updated on

Introduction

Monero is designed so that transactions are private by default. This means amounts, sender addresses, and recipient addresses are not publicly visible on the blockchain. While this protects users, it also raises a common question: how can someone prove that a Monero payment was made?

This guide explains exactly what can and cannot be proven using the command-line Monero wallet, and walks through the currently supported methods step by step. All examples assume a self-custody wallet and do not rely on third-party services.

What “proving a payment” means in Monero

In Monero, a payment proof does not reveal your wallet balance or full transaction history. Instead, it allows a specific verifier to confirm that a transaction matching certain parameters exists and was created by the sender.

Monero supports sender-generated transaction proofs that can be verified by a third party without revealing unnecessary information. This is made possible through cryptographic signatures tied to the transaction’s private data.

What can be proven

  • A specific transaction was created by the sender.
  • The transaction paid a given address.
  • The amount associated with that address.

What cannot be proven

  • Your total wallet balance.
  • Other incoming or outgoing transactions.
  • The recipient’s identity beyond the provided address.

These limitations are intentional and align with the privacy guarantees of Monero.

Methods available today

Sender-generated transaction proof (recommended)

This is the standard and safest method. The sender generates a proof using their wallet, which can then be shared with a verifier. The verifier does not need access to the sender’s wallet or keys.

Recipient-assisted verification

A recipient can independently verify that they received a payment by checking their own wallet. This is not a third-party proof and requires trust in the recipient’s statement.

Graphical interfaces such as the Monero GUI Wallet also support transaction proofs, but this article intentionally focuses on the command-line workflow.

How to generate a transaction proof (CLI)

This procedure shows how a sender generates a cryptographic proof that a specific Monero payment was made to a specific address.

Prerequisites

  • A fully synced Monero wallet using monero-wallet-cli
  • The transaction ID (TXID)
  • The recipient’s public address

Linux (Debian / Ubuntu)

  1. Open a terminal.
  2. Navigate to your Monero wallet directory.
  3. Start the wallet CLI.
./monero-wallet-cli --wallet-file your_wallet_name
  1. Unlock your wallet when prompted.
  2. Use the transaction proof command.
get_tx_proof <TXID> <RECIPIENT_ADDRESS>
  1. Copy the generated proof string.
  2. Send the proof and TXID to the verifier.

Windows

  1. Open Command Prompt or PowerShell.
  2. Navigate to the folder containing monero-wallet-cli.exe.
  3. Launch the wallet.
monero-wallet-cli.exe --wallet-file your_wallet_name
  1. Enter your wallet password.
  2. Generate the proof.
get_tx_proof <TXID> <RECIPIENT_ADDRESS>
  1. Save the output proof securely.
  2. Share it with the intended verifier.

What to expect

The wallet will output a long base58-encoded string. This is the transaction proof. Anyone with the TXID, recipient address, and proof can verify it.

Common problems

  • Wrong address: Proof verification will fail if the address does not match exactly.
  • Incorrect TXID: Even a single character error invalidates the proof.
  • Unsynced wallet: The wallet must be synced to generate valid proofs.

Safety notes

  • Only share transaction proofs with parties who need them.
  • A proof reveals the amount sent to that address.
  • Never share your private keys or seed phrase.

Next step: Ask the verifier to check the proof using their own wallet.

How to verify a transaction proof

Verification can be done by any party using a Monero wallet, without access to the sender’s funds.

check_tx_proof <TXID> <RECIPIENT_ADDRESS> <PROOF_STRING>

If valid, the wallet will confirm that the transaction paid the specified address and amount.

Frequently asked questions

Can Monero payments be proven to anyone?

Yes, but only in a limited and controlled way. Monero allows the sender to generate a cryptographic proof that a specific transaction paid a specific address. This exists to balance accountability with privacy.

Practical implication: if you anticipate needing proof, keep the TXID and recipient address. Common misunderstanding: many users believe Monero cannot prove payments at all, which is incorrect.

Does a transaction proof reveal my entire wallet history?

No. A transaction proof is scoped to one transaction and one recipient address. It does not expose other outputs, balances, or addresses.

Practical implication: you can safely provide a proof without compromising unrelated activity. Common misunderstanding: proofs are often confused with view keys, which are far more revealing.

Is a screenshot of the wallet enough as proof?

No. Screenshots are not cryptographically verifiable and can be fabricated. Monero proofs exist specifically to avoid reliance on trust or screenshots.

Practical implication: always use cryptographic proofs for disputes or audits. Common misunderstanding: visual evidence is often assumed to be sufficient, but it provides no cryptographic assurance.

Monero’s approach to payment proofs reflects its broader design philosophy: privacy by default, with selective transparency when the user explicitly chooses it.

Follow us
Exchange instantly
Sponsor
Latest Price
Sponsor
Monero.how Tutorials
Why Monero vs Bitcoin
Monero ELI5 (Explain like I'm five) - a super simple explanation of how Monero works
How Monero's privacy works
Monero Infographic
How long do Monero transactions take to confirm and unlock?
Transaction fees
Glossary of the most important Monero terms
A low-level explanation of the mechanics of Monero vs Bitcoin in plain English
Best Monero Wallets (2026): Trusted Picks and Clear Trade-offs
How to use the Monero GUI wallet
How to create a Monero command line wallet
How to speed up initial blockchain sync
How to send and receive Monero on the command line
How to Prove a Monero Payment (Command Line Wallet)
How to restore a command line wallet from your 25 word seed
How to verify your funds with a private view key
Best Ways to Buy, Sell, and Exchange Monero (XMR) in 2026
Set up a Monero wallet on a USB pendrive linux computer using a remote daemon
How to Mine Monero in 2026 – CPU Mining & the GPU Reality
How to Mine Monero on Windows (2026): XMRig (CLI) + P2Pool + GUI Options
Monero mining calculator
P2Pool for Monero: How It Works, Mini, and Payouts
How to run a Monero Node
Configure OpenAlias to more easily share your Monero address
How to Safely Hold Monero in Cold Storage
Create a paper wallet for secure offline storage
Display a Monero ticker on your Mac menu bar
Avoiding Google ad attacks
Trusted and untrusted sites
Send feedback, corrections or suggestions to hellomonero.how
Donations for running costs appreciated at 86oPE889B4qeJn14jkhQkPFnwRUV3Upd8TZjbU89JdWpH7NbECNHXMG67vSLCKZt1nTWK4v445cndXLNtw24WzmNGYs7WeH
Thanks to Monero developers and community members that answered questions that contributed to the content in this site: jollymort, hyc, moneromoo, smooth, jwinterm, debruyne, fluffypony, pero, needmoney90, ferretinjapan, idunk, saddam, wolf0, daveyjones, snipa, gingeropolous, markos, othe, m5m400, luigi1111, kenshi84
Disclaimer: This site contains opinion for informational purposes only and does not consitute investment advice. Information may contain errors and omissions. Use solely at your own risk. Services listed here are run by third parties and are not vetted by this site. The authors of this site and/or the authors of articles linked to from this site may have financial investments that may bias their opinions, including ownership of Monero currency. Always do your own research, form your own opinions, and never take risks with money or trust third parties without verifying their credibility. Remember to take your computer security seriously and never use a computer or phone that is at risk of infection by untrusted software that may contain malware or viruses. © Copyright 2025.