xmrchain.net & Explore.Moneroworld.com & monerotools.i2p

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Mine on xmrpool.net to support the hosting of this block explorer and other services of MoneroWorld!

Check out the Open Node Directory

Go to the Testnet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly?

Autorefresh is OFF

Tx hash: 28a831931a050f9970fe2d61c296034ce8831fef6cc7d9f42b7d0f72b7df8f41

Tx prefix hash: 3cb6ceb68bba4051442fa2167f385107db09b5888b653a7570e82bc619e087d7
Tx public key: d56e26bfc398d834fb841395f27d6bc14b31932d4d11a96798d6e6fe11c97ac1
Payment id (encrypted): 3b7db491d25a03f8
Timestamp: 1566715361 Timestamp [UCT]: 2019-08-25 06:42:41 Age [y:d:h:m:s]: 00:104:10:50:51
Block: 1908383 Fee (per_kB): 0.000028720000 (0.000016587298) Tx size: 1.7314 kB
Tx version: 2 No of confirmations: 75440 RingCT/type: yes/4
Extra: 0209013b7db491d25a03f801d56e26bfc398d834fb841395f27d6bc14b31932d4d11a96798d6e6fe11c97ac1

2 output(s) for total of ? xmr

stealth address amount amount idx
00: e32c5b4dfcb0343a073d960f4602e9cd01f921556075bb466532918d75882013 ? 12006231 of 13635028
01: ed46a2caf9f74d033e0309367d3341194360711a4f6a03a0d8157922ec979a25 ? 12006232 of 13635028

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-06-09 23:35:47 till 2019-08-25 03:59:41; resolution: 4.74 days)

  • |_*_______________________________________________________________________________________________________________________________________________________________*___*****|

1 input(s) for total of ? xmr

key image 00: 02d8306b4229e490d46facd6ed3e4dc386082ba9864aa215664f0fde52da42dd amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6ba87870c48959eeb48b58d91604565cb3fb736203633e7e4a78c37d19a3ed40 01329087 0 0/1 2017-06-10 00:35:47 02:180:16:57:45
- 01: 76d478c2a4347767679f558512f4c312072a5886c9398f024bc0837a882e9ce1 01877581 0 0/1 2019-07-13 11:46:26 00:147:05:47:06
- 02: 3e2f50b6009ccc1182cc0ceac0cd1e8f61c2de665b0a67620b764e7194363b48 01892223 11 2/2 2019-08-02 21:15:19 00:126:20:18:13
- 03: b48ffd7ab70215fbf607cf6982bca5a8d0fc179fc8e188c17872caea5377f1ac 01895016 11 1/2 2019-08-06 17:46:41 00:122:23:46:51
- 04: 135d6aaeb90e287b135adf6c3a5942c818fe34e0d7aa55ae6043c5a2aa68b53b 01900901 11 1/2 2019-08-14 21:39:07 00:114:19:54:25
- 05: b493448077113b4c9b95f638c3ce3d68d04556a1e4ed9b234fd9007b4fdd2dc5 01901042 11 2/2 2019-08-15 02:25:21 00:114:15:08:11
- 06: c108c314401a5db5fa56703b39ed3b1526e4b5dd9f4a2e6017634d2b5cf39ee1 01901528 11 2/2 2019-08-15 17:19:43 00:114:00:13:49
- 07: 9096ad83eb4a4826463a42ba0a5574b7dd6147a906887189cf3ca88f195ec00f 01905631 11 2/2 2019-08-21 10:54:13 00:108:06:39:19
- 08: 297e1d91a966bec396a6464d911deedd933c144388c6650d08ec3367b448daa9 01908086 11 1/16 2019-08-24 20:10:09 00:104:21:23:23
- 09: 3b183b1bab4dfb7d492d74fcc9d6f8bcebb356b6a03690a99126ec946f06db23 01908291 11 2/2 2019-08-25 02:48:23 00:104:14:45:09
- 10: 292e2f0da684422c127087c3a535ec1f1d4ed46b3ccc922719d1bc3ffba12953 01908292 11 1/3 2019-08-25 02:59:41 00:104:14:33:51
More details
source code | explorer version (api): master-2019-11-26-df6e3bb (1.1) | monero version: 0.15.0.1-6def88ad4