xmrchain.net & Explore.Moneroworld.com & monerotools.i2p

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Mine on xmrpool.net to support the hosting of this block explorer and other services of MoneroWorld!

Check out the Open Node Directory

Go to the Testnet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly?

Autorefresh is OFF

Tx hash: 0b4cd796a5e15d4677bfd3c96c012d7c586e838bc392c30314f9331648ea5a03

Tx prefix hash: 5599f4ef64e3e10026ab841e196f928f78d675f9835d891b68f95d57722ef298
Tx public key: 60c19935005438cb82f6a4dddf2d375cb86b5cdbc6b6c9565a120d90e816d715
Payment id (encrypted): 113b212dd93a55ca
Timestamp: 1575344762 Timestamp [UCT]: 2019-12-03 03:46:02 Age [y:d:h:m:s]: 00:003:20:08:50
Block: 1980453 Fee (per_kB): 0.000025000000 (0.000014455110) Tx size: 1.7295 kB
Tx version: 2 No of confirmations: 2787 RingCT/type: yes/4
Extra: 0160c19935005438cb82f6a4dddf2d375cb86b5cdbc6b6c9565a120d90e816d715020901113b212dd93a55ca

2 output(s) for total of ? xmr

stealth address amount amount idx
00: c3f96d22ad0be6cdf83a60da67ccfcd84f19b7af45e4625b727a552c8ec90884 ? 13555239 of 13623970
01: 6b4d0549dbdda356da9f01d134b44ee7568b606d1dd2cc37870bdf80af761504 ? 13555240 of 13623970

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2019-11-18 18:15:01 till 2019-12-03 04:17:19; resolution: 0.08 days)

  • |_*______________________________________________________________________________________________________*_____*_____*__________________*__________*_*__________________***|

1 input(s) for total of ? xmr

key image 00: eddfac1e9c01107b1a7b75663e8d8498aca4fb641809103e36201426d9089ca0 amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 15947701a11ba00ea7689b27ad2464bc7db282e897fd0ee5e9cafeb1c2a3998c 01969818 11 1/10 2019-11-18 19:15:01 00:018:04:39:51
- 01: f3c47e8e85b44290775cffe9ba4e6d021131f1ac6ae42f4ff5b5b79d13f247f9 01976132 11 2/2 2019-11-27 13:50:24 00:009:10:04:28
- 02: a45ec170c5b49ccbfc59b836a8597ba6eade5f134d96909394532db389fa5f28 01976525 11 2/2 2019-11-28 02:52:54 00:008:21:01:58
- 03: 57672aebf9d7c14c9b4159ecefd7a38192b12307479238c6b1f11b59bfc330f2 01976884 11 1/11 2019-11-28 14:24:51 00:008:09:30:01
- 04: b055f5fb5c90ca8d7ceeef2141189ebca0c57f178eda21e5c88a3b4a320fabf1 01978025 11 3/2 2019-11-30 05:32:17 00:006:18:22:35
- 05: e9fedbbcaad64395c599dc641a852f5f715dfe932fa7f7ff4ecbfa8add30266e 01978887 11 2/2 2019-12-01 04:24:55 00:005:19:29:57
- 06: fbe7d05e33c1dee2376d601eaaf7d9180b70aca1963ef533e7d76c160f629dd0 01979081 11 2/2 2019-12-01 08:37:14 00:005:15:17:38
- 07: d28305c13ea84e7918903d2bad810ea2ada257785094a5a411580ef0d28dc137 01980295 11 13/16 2019-12-02 23:00:07 00:004:00:54:45
- 08: f69094544d5f53b1e634a51d5b641867dcd2cc708ff067be66ef22dabebe833f 01980338 11 2/2 2019-12-03 00:23:34 00:003:23:31:18
- 09: 7ad017912d6f38ec9814bd42a457e5192a77258d24e22eb649516194dcee30b2 01980382 11 1/3 2019-12-03 01:31:04 00:003:22:23:48
- 10: c8cddb2cb82c60c8a683aa44418e28fff4bd1162b45f69a7cd01493dd7d04267 01980437 11 2/16 2019-12-03 03:17:19 00:003:20:37:33
More details
source code | explorer version (api): master-2019-11-26-df6e3bb (1.1) | monero version: 0.15.0.1-6def88ad4