xmrchain.net & Explore.Moneroworld.com & monerotools.i2p

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Mine on xmrpool.net to support the hosting of this block explorer and other services of MoneroWorld!

Check out the Open Node Directory

Go to the Testnet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly?

Autorefresh is OFF

Tx hash: 523d8df696893eb368388203c2069b40acafb3565ee4c4ec17b70d7d0c1e3ded

Tx prefix hash: 034d9524c3e662551e286ab503712258c34356fc3c2772d418d8fad3b72218fb
Tx public key: ab6c784dcdd335eb57e5e434b113adc99ce5ff123169e53f0d06be3622565216
Payment id (encrypted): 4fc2e98ab997df52
Timestamp: 1575343535 Timestamp [UCT]: 2019-12-03 03:25:35 Age [y:d:h:m:s]: 00:003:20:25:52
Block: 1980442 Fee (per_kB): 0.000025020000 (0.000014458510) Tx size: 1.7305 kB
Tx version: 2 No of confirmations: 2798 RingCT/type: yes/4
Extra: 01ab6c784dcdd335eb57e5e434b113adc99ce5ff123169e53f0d06be36225652160209014fc2e98ab997df52

2 output(s) for total of ? xmr

stealth address amount amount idx
00: b00dea12996b0aa24f761ae0437e15be0ec4075b11a575260f5750bdfb624a15 ? 13555065 of 13623970
01: 9516c17547653c4263f8eaddf44e87283610115ec0e7375148727d817a9612fb ? 13555066 of 13623970

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2019-10-21 12:54:09 till 2019-12-03 02:57:31; resolution: 0.25 days)

  • |_*__________________________________________*________________________*_____________________________________________________________________________*____________*___*__***|

1 input(s) for total of ? xmr

key image 00: b00d83442527a3be461b9086ed5a553ebc11bd21b5e554f0da5f53f376f26996 amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: cac4e3943b898236d029643c8b60929214220e56deff34dcf429c6ae637de51b 01949556 11 3/2 2019-10-21 13:54:09 00:046:09:57:18
- 01: 8c48b865233a0ba314c064dca680de696624584fe0eb07f2a4f235147c3f7c12 01957459 11 1/2 2019-11-01 12:54:20 00:035:10:57:07
- 02: 86a0cfb130b516bd94aefe59c6c8107b0e3e8ba0bf464ed66454032a852b1206 01961994 11 2/16 2019-11-07 21:07:34 00:029:02:43:53
- 03: 8be49e6565a6f3d9b361fd70db10c0d5f1516058c2055bdd7e57ddcc27eb685e 01976103 11 1/2 2019-11-27 12:43:09 00:009:11:08:18
- 04: a5922e7aacda3c3c1173d69ceddd504dfc2aebe3cce8db018d86d595f79409be 01978369 11 2/2 2019-11-30 17:09:44 00:006:06:41:43
- 05: 4087729595bffc391a96056d843602a23c29544073dd93e4a18f43aeb23b3445 01979446 11 1/2 2019-12-01 19:36:16 00:005:04:15:11
- 06: 1b7b20c34c330793feb1c9bd3ca10b5ca163ef61877d6a750827b4f88121358e 01979893 11 2/2 2019-12-02 10:00:53 00:004:13:50:34
- 07: 605a15bc883c55e0c41fd364f14f9a967fce44bff5d3bc041a67e841b755e392 01980063 11 1/2 2019-12-02 15:09:42 00:004:08:41:45
- 08: 47d6760dda46c36b8e46f6e1b00e6de1c35e97feb46f392bb3b7fe043ee4fec8 01980141 0 0/1 2019-12-02 17:31:10 00:004:06:20:17
- 09: 4336e6211b48f8283cc3f704944f708afc6e4737b6eae7db40d9338d23da9de5 01980378 11 2/2 2019-12-03 01:26:05 00:003:22:25:22
- 10: 378f5ef9a4ada64231e1f30090f066fb1a214c17d1547905aae8c9ce53cebd20 01980394 11 2/2 2019-12-03 01:57:31 00:003:21:53:56
More details
source code | explorer version (api): master-2019-11-26-df6e3bb (1.1) | monero version: 0.15.0.1-6def88ad4