xmrchain.net & Explore.Moneroworld.com & monerotools.i2p

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Mine on xmrpool.net to support the hosting of this block explorer and other services of MoneroWorld!

Check out the Open Node Directory

Go to the Testnet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly?

RANDOMX IS COMING

Tx hash: 2aaa4db3e7e55238d28c27acee6f2c0a16d4eb6ec6b1db5763357dd5217a5329

Tx prefix hash: dd308f3dec5fa16427d44f154fdc9069fbebaada5dcda405ddbfda16eac9eb10
Tx public key: 96ad43fd8550bb02440ba0e2be7b92143d6f3a73c02acd4327c1906e4bc8d577
Payment id (encrypted): d6db59daa81e8b01
Timestamp: 1573262361 Timestamp [UCT]: 2019-11-09 01:19:21 Age [y:d:h:m:s]: 00:009:10:28:38
Block: 1962852 Fee (per_kB): 0.000025840000 (0.000014949243) Tx size: 1.7285 kB
Tx version: 2 No of confirmations: 6761 RingCT/type: yes/4
Extra: 020901d6db59daa81e8b010196ad43fd8550bb02440ba0e2be7b92143d6f3a73c02acd4327c1906e4bc8d577

2 output(s) for total of ? xmr

stealth address amount amount idx
00: 28221d98e8c96802d0b6298437c9468d369fb6f7521d51483a4119b797c1a2e1 ? 13147891 of 13309196
01: cc5efdff77b6de3391cb16f90617e54049516804948947f8046e4d310bd89e4a ? 13147892 of 13309196

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2019-11-02 05:56:58 till 2019-11-09 01:44:22; resolution: 0.04 days)

  • |__*______________________________________________________________*___*________________________________________________*____________*__________*________________**_____*_*_|

1 input(s) for total of ? xmr

key image 00: 0abab35b5a6c9c9907cdabcce8c950b95af1d961ed9e43d7b861dd8c17b9fe59 amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: efdac5b645ae2417dfd601fdc0a28309503ed5d5080688b7daf6ad4b4baf5255 01957980 11 2/2 2019-11-02 06:56:58 00:016:04:51:01
- 01: a77d65e7586d87a6949a0828667bbc249901cca9f2d277e5aa5f5e00f3706df3 01959810 11 1/2 2019-11-04 20:12:58 00:013:15:35:01
- 02: d70b62361bfe8b545e0834f0c20661fecc2e6ffc8f10c576b48051fd3c22455f 01959939 11 2/12 2019-11-05 00:22:23 00:013:11:25:36
- 03: f28a3ba7a0bca55af522a2600529e7995faff658f8ed9334cf2eaff9e0d39e80 01961360 11 2/2 2019-11-06 23:33:42 00:011:12:14:17
- 04: 193c986f68fe7b880a20cd18c3094f1586cad2c376554f269f067772d61ec470 01961732 11 1/11 2019-11-07 12:12:36 00:010:23:35:23
- 05: d94b9a4b102b2b5b31c1893d101d70b8c5096fb716e32522d1a70062a79f3a49 01962043 11 1/2 2019-11-07 22:59:29 00:010:12:48:30
- 06: 4fbbef6b6aa02d30512e9e52e2d00156ab381e0680dece8c84dbed3b9aa0de4c 01962574 11 1/2 2019-11-08 15:53:43 00:009:19:54:16
- 07: 14fc8605c1be14b239638cea4e3b671e5bf0e569949b35e26ffefe5a52dbd5b7 01962587 11 1/2 2019-11-08 16:06:53 00:009:19:41:06
- 08: bfce0b79558c732338b59ef56a759bab285ec1246d597f3dc0a86ec558671fb3 01962787 11 2/2 2019-11-08 22:25:31 00:009:13:22:28
- 09: c4d3b04c671e1e1b7f61aac800ba2228be0fd0a67a42a6661d4d7a739d443388 01962827 11 4/6 2019-11-09 00:14:11 00:009:11:33:48
- 10: 9ebfeb04e614573d14904d0b855e721fd244f7f3380b3e22490488f12ac29bfb 01962837 11 1/2 2019-11-09 00:44:22 00:009:11:03:37
More details
source code | explorer version (api): devel-2019-05-22-7fca3a5 (1.1) | monero version: 0.12.3.0-master-67a56a9