xmrchain.net & Explore.Moneroworld.com & monerotools.i2p

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Mine on xmrpool.net to support the hosting of this block explorer and other services of MoneroWorld!

Check out the Open Node Directory

Go to the Testnet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly?

RANDOMX IS COMING

Tx hash: 0f85b34098cf37877ae4ce5aabeb148dd1e955ef59ddf7d1fab8b2967059be8c

Tx prefix hash: 999a38874b16d4f9ba33c1c71ff4c1fd6c784b5f0ab8ff4135bcb0aa184cc7af
Tx public key: 1a497c6a1b2b1d71908906f8197cd9f4d84d088261c9629f562729c194138c33
Payment id (encrypted): 1532703e55772e0a
Timestamp: 1562895044 Timestamp [UCT]: 2019-07-12 01:30:44 Age [y:d:h:m:s]: 00:124:00:56:19
Block: 1876509 Fee (per_kB): 0.000030470000 (0.000017627842) Tx size: 1.7285 kB
Tx version: 2 No of confirmations: 89198 RingCT/type: yes/4
Extra: 0209011532703e55772e0a011a497c6a1b2b1d71908906f8197cd9f4d84d088261c9629f562729c194138c33

2 output(s) for total of ? xmr

stealth address amount amount idx
00: 0b7e07a41285ccbb71bb110fc62fc828d64cf78f6de009a9d5eb807174b0c8f7 ? 11313082 of 13220920
01: fda4a06184858dd91f93cd90c054e62f95363bdc3f28cdc3a1ff5b0d308cd56c ? 11313083 of 13220920

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2019-02-08 14:11:40 till 2019-07-12 02:11:51; resolution: 0.90 days)

  • |_*____________________________________________________________________________*_______________________________________________________________________________*_________**|

1 input(s) for total of ? xmr

key image 00: 823da7d78d6be82a5d6cbf71b586b740825ca8786f8fdffca977609976bfaeb4 amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8f442918a7759e2d5935392d42f671ac9f2d42ef1be530d5f6166f61c74cd022 01767017 11 1/2 2019-02-08 15:11:40 00:277:11:15:23
- 01: 7b18179be000f8b6b430d1ab2d0b434c3e4d755b46f91682329f97bebc038ea7 01816943 11 1/2 2019-04-20 05:13:44 00:206:21:13:19
- 02: 504ca6e8e6322ab4287b1dfd9766b548fd06b44993648c01f70916e0dcdd1f31 01869175 11 1/2 2019-07-01 18:55:34 00:134:07:31:29
- 03: 9b4a290ee584f2eed96e06e60d79aae3e0dedc3946db6dabd9605d57a6bb34f6 01875298 11 1/2 2019-07-10 07:26:49 00:125:19:00:14
- 04: f5c4a165a6ed1eed70a4bc9d2420838694e0149e39aac2ef2392d4af2047e07c 01875939 0 0/1 2019-07-11 04:32:57 00:124:21:54:06
- 05: da865c6238b78c3e46f6aa9a971bd15f4e48190bc405c10af645465644c03c63 01876178 11 4/2 2019-07-11 12:55:10 00:124:13:31:53
- 06: 85e36aa542db1449c586dcf896d65245d4c528c978c94fb5d983daffe94e5333 01876327 11 2/2 2019-07-11 18:12:19 00:124:08:14:44
- 07: a9e76ac2b81f20c7ec008cf6fb140df52d5b0db31bf9fb2f1edab7d52aa2f64a 01876377 11 2/2 2019-07-11 20:04:58 00:124:06:22:05
- 08: ec277c120a6c37906485b69b09d7e4e2a85930a3d5763f743724b4319c72dfb9 01876412 11 2/2 2019-07-11 21:35:10 00:124:04:51:53
- 09: 9f54f0676b34676371d450f08a808f45050fcaef752d07e81c179eae7edcf810 01876493 11 1/2 2019-07-12 00:59:21 00:124:01:27:42
- 10: 9391fef7911899f82d57da57270bc1e0cc1e4dbb0628c871d5e3852f98e3f72c 01876497 11 5/2 2019-07-12 01:11:51 00:124:01:15:12
More details
source code | explorer version (api): devel-2019-05-22-7fca3a5 (1.1) | monero version: 0.12.3.0-master-67a56a9