xmrchain.net & Explore.Moneroworld.com & monerotools.i2p

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Mine on xmrpool.net to support the hosting of this block explorer and other services of MoneroWorld!

Check out the Open Node Directory

Go to the Testnet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly?

Autorefresh is OFF

Tx hash: 0dfe085fc98df386f088406496b56505f905b006e9edc0c2bf207d9bd0afc3dc

Tx prefix hash: b8bf50eb3d77c2de57b5da6b958c689f71dbed1029a4bde85898cbfc5e68eeb3
Tx public key: 30845d97266fbb34a0e2ec38361ad8d8daac0bb464574d7cf57c5ebb259e6390
Payment id (encrypted): f87177701dae8b29
Timestamp: 1560000349 Timestamp [UCT]: 2019-06-08 13:25:49 Age [y:d:h:m:s]: 00:182:04:06:15
Block: 1852465 Fee (per_kB): 0.000031970000 (0.000018453935) Tx size: 1.7324 kB
Tx version: 2 No of confirmations: 131355 RingCT/type: yes/4
Extra: 020901f87177701dae8b290130845d97266fbb34a0e2ec38361ad8d8daac0bb464574d7cf57c5ebb259e6390

2 output(s) for total of ? xmr

stealth address amount amount idx
00: 8e5fc0d43cce47dcd4234dd46cd37eadef40efb2e9392970bf2a621644983fdb ? 10654106 of 13634978
01: 2fbc917fe3b7eb73502775dda45f30bbef429187e0e0b197681bd0ea5c1df111 ? 10654107 of 13634978

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-09-09 20:48:04 till 2019-06-08 13:30:37; resolution: 1.60 days)

  • |_*___________________________________________________________________________________________________________________________*__________________________________*___**_***|

1 input(s) for total of ? xmr

key image 00: 2882eb4a92c4dce6bb59961a46570bac9807ecce401a7515a3232733c1a6a566 amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 13125d017921b76a86613422f66cd7967db7cbcc23241e0369b6e86aa9e2043d 01657815 7 1/2 2018-09-09 21:48:04 01:088:19:44:00
- 01: 2aeff403e53eeaa28da0826f3769789f321503eb660cf439604fd8fffca2cebb 01800632 11 2/3 2019-03-28 12:42:47 00:254:04:49:17
- 02: e0ef314aef23bb8e34dea4c900328a071aa2a046cc286d7ff0d8ca852f01cbc1 01841194 11 2/11 2019-05-23 22:44:43 00:197:18:47:21
- 03: 5de762eddb9cde0c15e61e4b9a122d6bf43a6adbbe0a5b0be9b9b95b3b2124ed 01845915 11 2/2 2019-05-30 10:40:38 00:191:06:51:26
- 04: b02004fdec48c8c3b33419d3f3f0b834aaebfe6a3044a8da6b7c263bc0412ada 01847003 11 1/2 2019-05-31 23:58:37 00:189:17:33:27
- 05: 0990530020c1afbef6d9dd0c57092434dc2f2e060ea4bb79df2fdfcc4d7a6980 01847564 11 3/4 2019-06-01 18:18:15 00:188:23:13:49
- 06: e8e9c8a05501ce6d75b7d86811d46fb5a770bdb915380606054bd1b386ee241c 01850097 11 1/2 2019-06-05 07:02:18 00:185:10:29:46
- 07: a53fed3f5e05b580371f0ae2c358b8921cc328864f85de12bfd891c1d71a97cc 01850559 11 2/2 2019-06-05 23:15:35 00:184:18:16:29
- 08: 715064ace670ad85e1be3e81cea13400ccc083ecd10a577c845846bd846aadf1 01852197 11 2/2 2019-06-08 04:01:12 00:182:13:30:52
- 09: 1d38a9d7f21e1078482ee65f757aa11e15efc1fa411db68c43fee08c1cd9890f 01852427 11 1/2 2019-06-08 12:25:24 00:182:05:06:40
- 10: 968b4482b274886502b8ec2fd97178bb8897a2de3b43c52f748fb3c5982a0adf 01852430 11 1/2 2019-06-08 12:30:37 00:182:05:01:27
More details
source code | explorer version (api): master-2019-11-26-df6e3bb (1.1) | monero version: 0.15.0.1-6def88ad4