xmrchain.net & Explore.Moneroworld.com & monerotools.i2p

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Mine on xmrpool.net to support the hosting of this block explorer and other services of MoneroWorld!

Check out the Open Node Directory

Go to the Testnet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly?

Tx hash: 0a3ab4249541c6033270ba66f4c7e5f00394747fa00a7a29800601fdc35679e4

Tx prefix hash: 024a003d6c8f6b5f06bf8cffb34b7b722957742f0bf4681bdde8cf2a3a8bc950
Tx public key: d509410ffa85e8a22fdad2dbad0cd3a42cfd0be22bea7defcecdc47f9d614c73
Payment id (encrypted): 14142debb64cb331
Timestamp: 1549852507 Timestamp [UCT]: 2019-02-11 02:35:07 Age [y:d:h:m:s]: 00:218:07:48:02
Block: 1768807 Fee (per_kB): 0.000039830000 (0.000021648577) Tx size: 1.8398 kB
Tx version: 2 No of confirmations: 156264 RingCT/type: yes/3
Extra: 02090114142debb64cb33101d509410ffa85e8a22fdad2dbad0cd3a42cfd0be22bea7defcecdc47f9d614c73

2 output(s) for total of ? xmr

stealth address amount amount idx
00: 6ce079aef697707766d37a4d2872e954e3353fb12870e1fe273e0119b25d70af ? 8804828 of 12367393
01: 500017a19095aa12f916b92404f4bd2aca2aaf68bd0b17bea4a58e38e6d45063 ? 8804829 of 12367393

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-12-05 22:48:28 till 2019-02-11 03:12:18; resolution: 0.40 days)

  • |_*__________________*________________________________________________________*___________________________________________________________________________________*____**_*|

1 input(s) for total of ? xmr

key image 00: 264753b37bc2e694c79bb756f35d9748ffc826918028f634d3245dea2269b661 amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4f0ce82e78ba03f07f793e0c22487c9bc1c02aa1cafa16f78e776ea9a84220de 01720255 11 1/2 2018-12-05 23:48:28 00:285:10:34:41
- 01: 873fe4a0d14d9f198b8b99d9f8dce72fe8163632c8149da23a893228f5fb8354 01725735 11 1/2 2018-12-13 15:41:15 00:277:18:41:54
- 02: 38e7a14ac40823b747a4e73026e2f46e21e5ab6a138ca2a1ea05610e1b6e9534 01742013 11 1/2 2019-01-05 06:47:43 00:255:03:35:26
- 03: 4664eef34e5048642f9ec2997c3c3f3818df6ff02154d1d1e617e4b149fb5e37 01766422 11 5/2 2019-02-07 20:18:57 00:221:14:04:12
- 04: 7d58f4f7f22038d5c95fdb235d7a4279760f8973ac59a8d362ab0b2035c0ef19 01767978 11 1/2 2019-02-09 22:02:43 00:219:12:20:26
- 05: 707f3d30f05feb7f539da2015a8e33554aabf616ddb900398ea0dc6c884738bb 01768006 11 2/2 2019-02-09 23:21:59 00:219:11:01:10
- 06: 5dbd081dd24fc27f61d0a91d2efdbe6a9d6b5319751ea99fe3829c4f6fae83de 01768563 0 0/1 2019-02-10 18:49:29 00:218:15:33:40
- 07: bedda0604fe00e4ef54818b469bec34d665deffd3cef2c2839ce9411cfa10c16 01768698 11 1/2 2019-02-10 22:59:07 00:218:11:24:02
- 08: 16abc8edcffda352f91bb2ea428fcc5b582de9a511e5c24674cd7965f23e7460 01768703 11 20/2 2019-02-10 23:12:40 00:218:11:10:29
- 09: 3c62a08d1934cd285e07f2aae2fc7b1c8a983e6f322a36a76953baf42f8746d3 01768788 11 1/2 2019-02-11 02:04:11 00:218:08:18:58
- 10: e7513a6716b406228987a4b066c9c93770b6a6934a792b6678aefc0c9bfdedee 01768792 11 1/2 2019-02-11 02:12:18 00:218:08:10:51
More details
source code | explorer version (api): devel-2019-05-22-7fca3a5 (1.1) | monero version: 0.12.3.0-master-67a56a9