Monero is a secure, untraceable and resilient digital currency. We believe it is the successor to Bitcoin. Read why.

How to prove you've made a payment

These instructions are for the command line version of the Monero wallet.

Proving that you have sent payment

If you need to provide details about a payment you've sent, then you MUST have access to the same wallet from which the Monero was sent. Because of the level of privacy that Monero allows for, people cannot just see a public record of payments you've sent. To prove payment, you need to have a record of something called a TXKEY which is only stored against a local copy of your Monero wallet. If you have created multiple wallets for the same address, then you cannot use any other wallet to obtain the TXKEY that you will require to prove payment.

To obtain the TXKEY for a payment you've sent, first use the show_transfers command to see a list of payments you've sent out
[wallet 47CL7F]: show_transfers
From the output of this command, locate the TXID of the payment you've sent. Then use the get_tx_key command to obtain the TXKEY for your TXID
[wallet 47CL7F]: get_tx_key 1234567890123456789012345678901212345678901234567890123456789012
Send the TXKEY or TXKEYs produced by this command to the person you need to prove the transaction to.

Verifying the proof that someone has provided you of a transaction

If someone has gone through the procedure outlined above to prove a transaction to you, you can verify that they made the transaction by substituting their TXIDs and TXKEYs, and your receiving ADDRESS into the following command:
[wallet 47CL7F]: check_tx_key TXID TXKEY ADDRESS
This command will then confirm how much Monero was sent.
Follow us
Exchange instantly
Sponsor
Latest Price
Sponsor
Monero.how Tutorials
Why Monero vs Bitcoin
Monero ELI5 (Explain like I'm five) - a super simple explanation of how Monero works
How Monero's privacy works
Monero Infographic
How long transactions take
Transaction fees
Glossary of the most important Monero terms
A low-level explanation of the mechanics of Monero vs Bitcoin in plain English
How to use the Monero GUI wallet
How to create a Monero command line wallet
How to speed up initial blockchain sync
How to send and receive Monero on the command line
How to prove you've made a payment
How to restore a command line wallet from your 25 word seed
How to verify your funds with a private view key
How to buy Monero
How to buy Monero via Coinbase
How to Buy Monero Using LocalMonero
How to Buy Monero Using Binance
Set up a Monero wallet on a USB pendrive linux computer using a remote daemon
How to mine Monero on Windows or Linux (Fedora or Ubuntu)
How to mine Monero with GPU
Monero mining calculator
How to run a Monero Node
Configure OpenAlias to more easily share your Monero address
How to Safely Hold Monero in Cold Storage
Create a paper wallet for secure offline storage
Display a Monero ticker on your Mac menu bar
Avoiding Google ad attacks
Trusted and untrusted sites
Send feedback, corrections or suggestions to hellomonero.how
Donations for running costs appreciated at 4JUdGzvrMFDWrUUwY3toJATSeNwjn54LkCnKBPRzDuhzi5vSepHfUckJNxRL2gjkNrSqtCoRUrEDAgRwsQvVCjZbRx8NCvspxJMRJcG69H
Thanks to Monero developers and community members that answered questions that contributed to the content in this site: jollymort, hyc, moneromoo, smooth, jwinterm, debruyne, fluffypony, pero, needmoney90, ferretinjapan, idunk, saddam, wolf0, daveyjones, snipa, gingeropolous, markos, othe, m5m400, luigi1111, kenshi84
Disclaimer: This site contains opinion for informational purposes only and does not consitute investment advice. Information may contain errors and omissions. Use solely at your own risk. Services listed here are run by third parties and are not vetted by this site. The authors of this site and/or the authors of articles linked to from this site may have financial investments that may bias their opinions, including ownership of Monero currency. Always do your own research, form your own opinions, and never take risks with money or trust third parties without verifying their credibility. Remember to take your computer security seriously and never use a computer or phone that is at risk of infection by untrusted software that may contain malware or viruses. © Copyright 2017.