xmrchain.net & Explore.Moneroworld.com & monerotools.i2p

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Mine on xmrpool.net to support the hosting of this block explorer and other services of MoneroWorld!

Check out the Open Node Directory

Go to the Testnet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly?

Autorefresh is OFF

Tx hash: 57937aab305dfc8f01172998669419251058d077185576e09904efa0d54fa340

Tx prefix hash: 88a99ffdeda14c4bcad75e13ab09f8870b784b3ef5c8f26f9994ab38dc1e5a62
Tx public key: 8b4e8c4d125d32a1e4c51648e675b147832b8aa528361acf03f47fb2022c6861
Payment id (encrypted): b112473874905b5e
Timestamp: 1575344165 Timestamp [UCT]: 2019-12-03 03:36:05 Age [y:d:h:m:s]: 00:003:20:14:43
Block: 1980447 Fee (per_kB): 0.000025030000 (0.000014456131) Tx size: 1.7314 kB
Tx version: 2 No of confirmations: 2793 RingCT/type: yes/4
Extra: 018b4e8c4d125d32a1e4c51648e675b147832b8aa528361acf03f47fb2022c6861020901b112473874905b5e

2 output(s) for total of ? xmr

stealth address amount amount idx
00: 356a3e715e818cbe975aa9eaae9e72ee8d8e6a4c0b86e0103354a0de4d2ad152 ? 13555147 of 13623970
01: 39d0fd5060237c9887fa5d4dbd48a1ff3ec025f358051fd0ba4ff511865acbfe ? 13555148 of 13623970

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-09-22 02:16:35 till 2019-12-02 21:01:44; resolution: 2.57 days)

  • |_*________________________________________________________________________________________________________________________________________________________*_____*_______**|

1 input(s) for total of ? xmr

key image 00: ca2d43ae1c3ac9ce0e49f2123aeadc49878c8b85dea599b2a10c966ee7db390d amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ca2571befec4ba78d7d89e80f3dda74bb18acdf6358a5364b380dca283218a10 01666597 7 1/2 2018-09-22 03:16:35 01:075:20:34:13
- 01: b5ac15a0b7c2333caa797a5abe87fcfdc202b6b9f5422d5155ae61d833438a8f 01951248 11 1/2 2019-10-23 21:55:42 00:044:01:55:06
- 02: 63b0b01bcc35f545444db55197b4a852aa7bff72f7e9c4a6c471aff54a1fb201 01962130 11 2/2 2019-11-08 02:10:53 00:028:21:39:55
- 03: a6d5ffe472cae1e9bdef80fb71e9465b86883515b36dde7f21b666e146a03817 01976538 11 2/2 2019-11-28 03:19:34 00:008:20:31:14
- 04: 8dee6d27f3053fab00025d5da761821c095afedd76406a3837ac0ddbe9b56670 01978496 11 2/2 2019-11-30 20:29:21 00:006:03:21:27
- 05: fd101d2ca3ef1e5628906094ad132f681cca17f16dfab383bdcac16a6ca6e099 01979271 0 0/1 2019-12-01 14:02:46 00:005:09:48:02
- 06: 4cd49cb8128ad6e8a0a6509c6bb147b2cbce599c8d6e718ddc195eaa9b5ebe8a 01979630 11 2/2 2019-12-02 01:13:53 00:004:22:36:55
- 07: ffdfe671409520938ea61dfe43968ca2633dccd95948d0a4aedf83555e61e4b2 01979962 11 2/16 2019-12-02 12:05:01 00:004:11:45:47
- 08: b6698365e399b0c15abc59d573da82c9b489c7d5d0c123691d69e79f69aa80e2 01980092 11 1/2 2019-12-02 16:00:45 00:004:07:50:03
- 09: 7d5a33d732041d1fefcf2989b1f0acbd0b4d727659561ac1e0adc8f996d6e94a 01980136 11 29/2 2019-12-02 17:25:50 00:004:06:24:58
- 10: 07887d582f0aea5ed9883042f098383161cd011526f49df3be991ea4a6d072e2 01980216 11 2/2 2019-12-02 20:01:44 00:004:03:49:04
More details
source code | explorer version (api): master-2019-11-26-df6e3bb (1.1) | monero version: 0.15.0.1-6def88ad4