xmrchain.net & Explore.Moneroworld.com & monerotools.i2p

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Mine on xmrpool.net to support the hosting of this block explorer and other services of MoneroWorld!

Check out the Open Node Directory

Go to the Testnet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly?

Tx hash: 1a25ddf2b7d852cb0475f9cfcec239532178cb8289c3b1de67db8364d4fa3448

Tx prefix hash: 9a7c2711496dd24ec04512fdbbe4683c12d64eca146b5d8813f4e50fb1477dff
Tx public key: 1510aaef673459f29ee66dde2b6d0de8b307b188d039828e2fe935a7b6459273
Timestamp: 1511442310 Timestamp [UCT]: 2017-11-23 13:05:10 Age [y:d:h:m:s]: 01:298:08:09:54
Block: 1449274 Fee (per_kB): 0.013063120000 (0.000989396071) Tx size: 13.2031 kB
Tx version: 2 No of confirmations: 476091 RingCT/type: yes/2
Extra: 011510aaef673459f29ee66dde2b6d0de8b307b188d039828e2fe935a7b6459273

2 output(s) for total of ? xmr

stealth address amount amount idx
00: b30f936f2f1e25089346b78487b32b66d4a264f81a84432bd85fa54628f25ed7 ? 3441944 of 12375612
01: d50be256ce8b1922693e6b0837d737e5b30e5b3e2585d623f56dbb0c0d92f989 ? 3441945 of 12375612

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-02-18 09:30:28 till 2017-11-23 13:40:48; resolution: 1.64 days)

  • |_*__________________________________________________________________________*_____________*______________________________________________________________________________*|
  • |________________________________________________________________________________*________________________________________________________________________________________*|

2 input(s) for total of ? xmr

key image 00: 8ef6d3aca02b704140d9fb44165cd284380e73733271dec8381e8cd83002de9a amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 759efcb6620584fc27c482227dd34a72189a3d4058ebe19e3bc5f2ca6f83fcdb 01248772 3 2/9 2017-02-18 10:30:28 02:211:10:44:36
- 01: f68bbef21be8988e7e285465406b8b9293878b44d386a44c51555171111e9998 01337777 5 4/30 2017-06-22 00:15:32 02:087:20:59:32
- 02: a804f30a43c4717362015443c20c9afe4d7d17b36bc1ec3610ed967e2dbe3167 01354808 0 0/1 2017-07-15 15:03:16 02:064:06:11:50
- 03: bcad16367514a828012a0fb391658c0a941bb445cb294452776650235af99ae6 01449128 5 7/45 2017-11-23 08:04:48 01:298:13:10:18
- 04: 058703e694bb36c494bffbfa69ddf12d6235d09911c7c70fe0f2ab51d5f0277d 01449200 5 2/2 2017-11-23 10:42:42 01:298:10:32:24
key image 01: 950e7b0892721ac10e6261b3f93fd51fa780741f88aa0ca6733e6ba133152e95 amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: eb13a80dbc51f3be66a40d3c3b0df21f43815a43373334870a18692b6a611637 01343374 3 12/13 2017-06-29 19:06:01 02:080:02:09:05
- 01: 8e74ab14d5669af69238d995ed17e05a2957c12f0087ed42636a40171152913d 01448869 5 1/2 2017-11-22 22:55:52 01:298:22:19:14
- 02: 5b0f72c1c838559f714023edeb8377ca2ac8d7c382b073ab9f3e7e4f441619ab 01448980 0 0/1 2017-11-23 02:35:46 01:298:18:39:20
- 03: 64caf04ad5e704e91c5ff5882696d93e692048d7cb6cfaaba020155956f96b86 01449062 5 2/2 2017-11-23 05:48:42 01:298:15:26:24
- 04: 1c333cfc446c9f1366eaa859015e713b6df9c7353691fe03ff0e86370304c279 01449263 5 2/2 2017-11-23 12:40:48 01:298:08:34:18
More details
source code | explorer version (api): devel-2019-05-22-7fca3a5 (1.1) | monero version: 0.12.3.0-master-67a56a9