xmrchain.net & Explore.Moneroworld.com & monerotools.i2p

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Mine on xmrpool.net to support the hosting of this block explorer and other services of MoneroWorld!

Check out the Open Node Directory

Go to the Testnet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly?

Autorefresh is OFF

Tx hash: 04ec7bc1454bf91faf9df107876606eb3543a9c1118f04540fc4f3848243752b

Tx prefix hash: 020762f0283141e092358ce7a2a811d6245f9b9d5b853e0847c617272cbd1d7b
Tx public key: 82a0e207eab6916d44efe4c253c5bae5e0c6b7db8b6075343828a363f4910a0a
Payment id (encrypted): 6b2ea1e897f34870
Timestamp: 1575344475 Timestamp [UCT]: 2019-12-03 03:41:15 Age [y:d:h:m:s]: 00:002:21:47:00
Block: 1980451 Fee (per_kB): 0.000025020000 (0.000014458510) Tx size: 1.7305 kB
Tx version: 2 No of confirmations: 2099 RingCT/type: yes/4
Extra: 0182a0e207eab6916d44efe4c253c5bae5e0c6b7db8b6075343828a363f4910a0a0209016b2ea1e897f34870

2 output(s) for total of ? xmr

stealth address amount amount idx
00: 2f7483d3eaf67766dd9dc439d8ddd216c346e8ffe6a2247ae273c4161b3bb061 ? 13555175 of 13610171
01: 1901920a20df0f040bf9b4727a1e582476f2bbee8c77fb4a33ec1f19fba93ca5 ? 13555176 of 13610171

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2019-05-10 19:49:37 till 2019-12-03 03:57:02; resolution: 1.21 days)

  • |_*__________________________________________________________________________________________________________________________________*__________________________________***|

1 input(s) for total of ? xmr

key image 00: 0ce94deec036dc98b284bc412a39e1551407ddeb8be25d6042ca20decc940506 amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0e804dfee0fb0653847034b1eeb26db71c0751d6d0ade047e2c17a8315e4c17b 01831864 11 17/15 2019-05-10 20:49:37 00:209:04:38:38
- 01: c604452b0e6579736aab33200584f9adcf5721edc143f109e1aad182de39b7eb 01947585 11 1/2 2019-10-18 19:52:17 00:048:05:35:58
- 02: 2d94fbd875e2b6568b25c54fc18d9ff3af82c5d53e42ebd385c0783f7a5e5ca4 01977675 11 1/15 2019-11-29 17:09:16 00:006:08:18:59
- 03: bbfa8d7b0b94b27e4716598f020369429017828fdb9ad64f78d0adca38fc6c83 01978839 0 0/1 2019-12-01 03:33:09 00:004:21:55:06
- 04: cc4a16d673028e76b034756169e9b52816cab1cbab68a2c9a739cd1932d9c6ae 01979070 11 2/2 2019-12-01 08:22:07 00:004:17:06:08
- 05: a6dc862ebd8d2097eed8c169f37773a0fc7eefe6cdcfacac8415f6294fb836df 01979565 0 0/1 2019-12-01 23:24:18 00:004:02:03:57
- 06: 8b6deeda645db5e8d369b138673d19450737b4ee921f6b829c288a59aa5d02d0 01979985 11 2/2 2019-12-02 12:43:34 00:003:12:44:41
- 07: 10056887c5331f7011bdb687f2c6786d07d0a4616523e77e698e1f67dacaf7fd 01979998 11 4/2 2019-12-02 13:16:54 00:003:12:11:21
- 08: 0a7c4dd083320842e2d47d4cf62c24a119fa33f5c3fcd98b0a6af77dc9b6de10 01980338 11 2/16 2019-12-03 00:23:34 00:003:01:04:41
- 09: ae1adad458c9d9f176a73272a4846f9ffe9fe74353fc0f04b0dda83ddebf00ad 01980361 11 1/2 2019-12-03 00:55:48 00:003:00:32:27
- 10: aed98b751735b274627527b887f622d73897da98f8ccfc0e64ec028148c6c953 01980425 11 2/2 2019-12-03 02:57:02 00:002:22:31:13
More details
source code | explorer version (api): master-2019-11-26-df6e3bb (1.1) | monero version: 0.15.0.1-6def88ad4