xmrchain.net & Explore.Moneroworld.com & monerotools.i2p

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Mine on xmrpool.net to support the hosting of this block explorer and other services of MoneroWorld!

Check out the Open Node Directory

Go to the Testnet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly?

Autorefresh is OFF

Tx hash: 41727b1bb5b51921b4c3af27a07d5d223c3660eda783bde6a2c29127c9d943ff

Tx prefix hash: d4e3bbd4f8b5b68ba5fd46463c0349da2b866662fcf6dc5a2e1d4a950957fc9e
Tx public key: 2033ff0465e1e6ee5cae781dddfc0c985a02ac5635d59eb5beb81fa1ba2c9208
Payment id (encrypted): 91acc8a457189730
Timestamp: 1575343535 Timestamp [UCT]: 2019-12-03 03:25:35 Age [y:d:h:m:s]: 00:003:20:26:43
Block: 1980442 Fee (per_kB): 0.000024990000 (0.000014457492) Tx size: 1.7285 kB
Tx version: 2 No of confirmations: 2798 RingCT/type: yes/4
Extra: 012033ff0465e1e6ee5cae781dddfc0c985a02ac5635d59eb5beb81fa1ba2c920802090191acc8a457189730

2 output(s) for total of ? xmr

stealth address amount amount idx
00: 715b432e64b3a958aaef1cc4dfe28a97feca5d20e45b98a17f3f406f27b02ea8 ? 13555073 of 13623970
01: 0c12343cabf4d76cf32764fa2012838444f532c7fa1457455677638219ca1449 ? 13555074 of 13623970

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2019-11-21 23:07:39 till 2019-12-03 04:00:23; resolution: 0.07 days)

  • |_*____________________________________________________________________________*___________________________________________________________________*________________*_*****|

1 input(s) for total of ? xmr

key image 00: d2a04dc5b976d22215fe600540bcf2c6564570b31b993626aa87b01f2e995066 amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 69b800581eb06860d766d2a2dc4be4bbb991ccaade794c75501519f450945067 01972113 11 2/2 2019-11-22 00:07:39 00:014:23:44:39
- 01: 8c66d145311c28e0247f44892891c646a3daceea1041aa3a20bddb3a8b07e72b 01975791 11 2/2 2019-11-27 02:14:32 00:009:21:37:46
- 02: 52a8bc7b4072b533b0d5ccb95f284d4abc23385551ec5d7d3388492a7447c881 01979310 11 2/16 2019-12-01 14:58:58 00:005:08:53:20
- 03: e2091b0fa99cf0a6d75c5192ebf88468821e883c0b3004a9aa27b28253dd59cd 01980154 11 4/2 2019-12-02 17:53:24 00:004:05:58:54
- 04: efd67c968a948ceda54bd89c80dae892593a73f43e25c021ff81119701d94937 01980218 11 2/2 2019-12-02 20:05:41 00:004:03:46:37
- 05: 373a63ebb01055f68e81fb2b735b776782c15630731ed0fdd22930637e69ce22 01980224 11 2/16 2019-12-02 20:14:23 00:004:03:37:55
- 06: 90e0b47ede12699fbb2d061ce9d7f56bf570c91086954aac586b0c26ba2ae253 01980264 0 0/1 2019-12-02 21:56:00 00:004:01:56:18
- 07: 65a9967d43d0c47635c7e69502468257f2a89a6242b26e12e369ab8e05ea4a67 01980357 11 2/2 2019-12-03 00:48:53 00:003:23:03:25
- 08: 4f9874572b0b1b36a6fb56fafa81ff69f59beb3152765a89c1bf4378a1ce20ff 01980376 11 2/2 2019-12-03 01:23:07 00:003:22:29:11
- 09: 7391906e723102b74b5fa8a3fac5ddce482d54108462f38ec2fbda80114106f8 01980412 11 2/2 2019-12-03 02:36:07 00:003:21:16:11
- 10: 3cb9a794bebf3310c671074fb0abe28170bebb168bbee04b525203dd0a9ccf03 01980427 11 1/2 2019-12-03 03:00:23 00:003:20:51:55
More details
source code | explorer version (api): master-2019-11-26-df6e3bb (1.1) | monero version: 0.15.0.1-6def88ad4