xmrchain.net & Explore.Moneroworld.com & monerotools.i2p

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Mine on xmrpool.net to support the hosting of this block explorer and other services of MoneroWorld!

Check out the Open Node Directory

Go to the Testnet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly?

RANDOMX IS COMING

Tx hash: 1c1d1bcfac7cce28773789601aa1dd1ca9b611a6940ade50df328251d100aeeb

Tx prefix hash: bc95fcc9ceb5bc3a55f6f7e0117d0e36efdad5851c9f19d68e8aa14dbd9fcb1a
Tx public key: 0867ddef90521730fbef881cfcc47c49f152ef1acd01b0984a856228b813cbbf
Payment id (encrypted): b1fea53a98ee49b8
Timestamp: 1573262361 Timestamp [UCT]: 2019-11-09 01:19:21 Age [y:d:h:m:s]: 00:012:01:57:51
Block: 1962852 Fee (per_kB): 0.000129570000 (0.000074749115) Tx size: 1.7334 kB
Tx version: 2 No of confirmations: 8658 RingCT/type: yes/4
Extra: 010867ddef90521730fbef881cfcc47c49f152ef1acd01b0984a856228b813cbbf020901b1fea53a98ee49b8

2 output(s) for total of ? xmr

stealth address amount amount idx
00: 8eeb7a7347cf116ee188e1b9a70a29c0338c797e33b3c2b2ad38ae0424fd57d8 ? 13147873 of 13357372
01: c172d206a06a0ab038a9efd119bcbe7574b1360ff8508188779a38ebbea5d9e2 ? 13147874 of 13357372

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-12-12 20:37:29 till 2019-11-08 23:15:08; resolution: 1.95 days)

  • |_*_______________________________________________________________________________________*____________________________________________*_________________________*______***|

1 input(s) for total of ? xmr

key image 00: 33b091ca6dc24487cb08b5b707eff91c24c3b95f13c03cd0f22e050fc70fa618 amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1c0cb90ebe226f21e3e3a720c5bba92703bbf1c27aa2bf33dd842b129fc6885c 01725193 11 2/2 2018-12-12 21:37:29 00:343:05:39:43
- 01: 6345c70abeabf9112c74489c73613dce092c751356f67b9f7dd05d5637621fd9 01849117 11 1/11 2019-06-03 21:16:31 00:170:06:00:41
- 02: 21f4fd9afdfc7f3e3fed57e03904776b72555e6eb0c12b1b8fc394d834f2e351 01912489 11 1/2 2019-08-31 00:01:59 00:082:03:15:13
- 03: 0a3a32b352be3387cb8aa4196c059fa97770acd663ea87f2d13b0c935e66b465 01949454 11 1/16 2019-10-21 10:05:18 00:030:17:11:54
- 04: caf154bc7fc06a6d478215c5d3bc42098d31d6d39b9dcb714028a10983a05e00 01959585 11 2/2 2019-11-04 13:17:32 00:016:13:59:40
- 05: a25ccfca2797524a172e9c0bbc1046a0d3b7129ff3fc47d3b4c66b92d28df77e 01960948 11 1/2 2019-11-06 11:01:41 00:014:16:15:31
- 06: c2ee95157b2f11a91eb3f856238b195d02de9b0932f85cd923cf5d0321aa076f 01962208 11 2/11 2019-11-08 04:28:23 00:012:22:48:49
- 07: 94b2642e483fe263f5d9065aa80b187a78e25d65f4e71aa666141ae5915a7909 01962465 11 3/2 2019-11-08 11:59:36 00:012:15:17:36
- 08: 254eb1f9efcb19fc5aa2610e2768d6062d3780024fcf10509753fcdf5bc2a864 01962588 11 1/2 2019-11-08 16:07:54 00:012:11:09:18
- 09: b791dbb0ae9a297d55a2d44a2892b41aec4fac9d1fc8d509628f93d120e87466 01962688 11 2/2 2019-11-08 19:09:24 00:012:08:07:48
- 10: a841f5ccce3a47826f9b0b89f1f2b6aa1b659db90ea8896476b781d8b8f6d98d 01962777 11 49/2 2019-11-08 22:15:08 00:012:05:02:04
More details
source code | explorer version (api): devel-2019-05-22-7fca3a5 (1.1) | monero version: 0.12.3.0-master-67a56a9