xmrchain.net & Explore.Moneroworld.com & monerotools.i2p

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Mine on xmrpool.net to support the hosting of this block explorer and other services of MoneroWorld!

Check out the Open Node Directory

Go to the Testnet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly?

Autorefresh is OFF

Tx hash: 4f5f50878ef1c13e6645d7b6f695e23fdc07f18dd01231ba9d5b3884508a1b9b

Tx prefix hash: 5b3e09135c30a7415badaa3e67cb07f844479e651c386ade76ddfe7960f33049
Tx public key: 8615ace40efa1d04b6f3bb0fc5551543f63afdbb886b367037dca723a2fffabf
Payment id (encrypted): 951fff24ea6051fa
Timestamp: 1575344165 Timestamp [UCT]: 2019-12-03 03:36:05 Age [y:d:h:m:s]: 00:002:21:52:10
Block: 1980447 Fee (per_kB): 0.000125010000 (0.000072281333) Tx size: 1.7295 kB
Tx version: 2 No of confirmations: 2103 RingCT/type: yes/4
Extra: 018615ace40efa1d04b6f3bb0fc5551543f63afdbb886b367037dca723a2fffabf020901951fff24ea6051fa

2 output(s) for total of ? xmr

stealth address amount amount idx
00: d9e0aacfe82a7bddbec897a6eb675d1a5dfbbc8542122b3d0118e734ce04dbfe ? 13555134 of 13610171
01: 40fe648a2091d1431e383f500371cc3ab414a5d06e9ec6a06a57def45e180d90 ? 13555135 of 13610171

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2019-07-02 11:25:42 till 2019-12-03 03:22:13; resolution: 0.90 days)

  • |_*____________________________________________*_____________________________________________________________________________________________________________________*___**|

1 input(s) for total of ? xmr

key image 00: 04e42534e1f58a4df45e99f95f2fb45addbe1eb82f2ace44e030b620954d33d8 amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6327066b0d760c7fd0b0f63f68bac0fcb4423e30eb05570906fe7a631521c2d3 01869674 11 3/2 2019-07-02 12:25:42 00:156:13:02:33
- 01: b8b81127cbf66435987ab04baa54d35f379eee97ac666b5f854dea32564ba23d 01899158 11 2/2 2019-08-12 11:25:19 00:115:14:02:56
- 02: 96f74cc6f5db8558060fad80befe6102a76a89717234c2eef0ebd427901408e7 01976256 0 0/1 2019-11-27 17:41:50 00:008:07:46:25
- 03: b8e26796a89307049700633406ef7cdfc4c229ec39e529f9e053c1334cbea6f6 01979748 11 2/2 2019-12-02 05:13:08 00:003:20:15:07
- 04: 7fb1d40cc930b1b0237082403293decdac6de8351e30fb6991f380772c7c51f3 01979844 11 2/2 2019-12-02 08:05:43 00:003:17:22:32
- 05: 464cc35ee4c024c30a0f0dfc115c6aa9f1599e77a80cb797147c6df3e11f0976 01979967 11 2/2 2019-12-02 12:11:43 00:003:13:16:32
- 06: 27df764f3b5270e33b16c1046904e3c197919adc61b06f2ca70c966705f51e58 01980045 11 1/2 2019-12-02 14:43:48 00:003:10:44:27
- 07: 363aac1388e882860091d6edb89c1b42a427713f11d15cc533012a66a938463d 01980240 11 1/7 2019-12-02 21:03:27 00:003:04:24:48
- 08: 89d297a91d01f8c49344d205162057cd420963794683c9340f03c6dce004b534 01980290 11 2/3 2019-12-02 22:54:16 00:003:02:33:59
- 09: 7036874fcc84272b1e8177142397d5d4b89648f5ee0e0c5402b77bc12203541e 01980338 11 1/2 2019-12-03 00:23:34 00:003:01:04:41
- 10: f7f31767c1a821c0448fe3aafe98112140d5ae0313baf2ab3b3a1eb0919045ac 01980408 11 1/2 2019-12-03 02:22:13 00:002:23:06:02
More details
source code | explorer version (api): master-2019-11-26-df6e3bb (1.1) | monero version: 0.15.0.1-6def88ad4