xmrchain.net & Explore.Moneroworld.com & monerotools.i2p

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Mine on xmrpool.net to support the hosting of this block explorer and other services of MoneroWorld!

Check out the Open Node Directory

Go to the Testnet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly?

Autorefresh is OFF

Tx hash: 04da573aeeacff4eb4b901783d4736c5d8aaa95408ffc4150825de108b5185b8

Tx prefix hash: fd6027d49534ecef1680a2794d0dde9db8b9c73caa6c08d6ff2b4d50e69fdd25
Tx public key: 3c239795936de923677b32f41fa708b076b9ebe97fc6337736bd27a6287e9fa1
Payment id (encrypted): a693435b3478d17e
Timestamp: 1575344165 Timestamp [UCT]: 2019-12-03 03:36:05 Age [y:d:h:m:s]: 00:002:21:53:05
Block: 1980447 Fee (per_kB): 0.000025030000 (0.000014456131) Tx size: 1.7314 kB
Tx version: 2 No of confirmations: 2103 RingCT/type: yes/4
Extra: 013c239795936de923677b32f41fa708b076b9ebe97fc6337736bd27a6287e9fa1020901a693435b3478d17e

2 output(s) for total of ? xmr

stealth address amount amount idx
00: 96ce4c34b6b4709eb551a6431d2a98e05e069649ba3d940af575b031361dd8d2 ? 13555145 of 13610171
01: 185f3ec9aa8321919a0bb3d20a55703947163e0719096c907d8043bd519b903d ? 13555146 of 13610171

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2019-07-27 12:00:35 till 2019-12-03 04:17:19; resolution: 0.76 days)

  • |_*___________________________________________________________________________________________________________*___________________________________*_____________*______*_**|

1 input(s) for total of ? xmr

key image 00: 56e5b3a53960a2b3932a8558a75ab1ab79713811d56180f458964e051f4ded03 amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: aedbf3e633f22b403fd0a0635f5f1b33f5d0af4111d9a4d1f2503e411cce61b9 01887635 11 2/2 2019-07-27 13:00:35 00:131:12:28:35
- 01: c6eb6e85c3b28919793b94df44df1614160f2a738655eb31bd7a5203a635f6e3 01947079 11 2/2 2019-10-18 02:16:10 00:048:23:13:00
- 02: a47d7e73ee2ec4d8334b8a8e798e80a8a35c2b69442a90b0143321f8cff77b4d 01966628 11 1/2 2019-11-14 07:21:08 00:021:18:08:02
- 03: 6d78b4c5e8b46d461a02f6db1dc2b845eb6189ce2c66ef5506509a2b7a52c086 01974584 11 2/2 2019-11-25 09:37:00 00:010:15:52:10
- 04: af64f0c54fc09861c89a18c8a41649efbe86b6547b73c71e9d1a43a3c9e16b76 01978234 11 1/2 2019-11-30 12:26:12 00:005:13:02:58
- 05: 9960ac195a8fcb4267536118298044736f01186f953c346c675f511c37703f1b 01979533 11 2/7 2019-12-01 22:18:19 00:004:03:10:51
- 06: 5675dd1445d497f46a2aec66447072ee691375017e8218ea097febff58447284 01979901 11 2/2 2019-12-02 10:11:57 00:003:15:17:13
- 07: d09eeda72a2344c9e63ccd1a6ec15d9bdee1176b730ae0f8381742f3740e9516 01980165 11 2/16 2019-12-02 18:20:41 00:003:07:08:29
- 08: 5a21b242dca9e3d60eff03a51cd2e8e3af11ca30cd48243c11600f9396a0f502 01980372 11 1/2 2019-12-03 01:16:44 00:003:00:12:26
- 09: 95491aed71b232fa7261543ee9788f9edc56ad370d519ce6efa427014456c9c9 01980401 11 2/2 2019-12-03 02:09:04 00:002:23:20:06
- 10: 5152902a2cc4dee867b72c3a3492c87a1d2ee59c91b502e992595e8bf6f48937 01980437 11 2/16 2019-12-03 03:17:19 00:002:22:11:51
More details
source code | explorer version (api): master-2019-11-26-df6e3bb (1.1) | monero version: 0.15.0.1-6def88ad4