xmrchain.net & Explore.Moneroworld.com

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Solo mine on your own blockchain to support the monero network!

Public Node Directory || Monero Block Frequency Tool || Monero Website || Make Monero Better!

Monero Testnet Explorer || Monero Stagenet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly? Monero FAQ

Moneroblocks Explorer || Monerohash explorer || Map of Monero Network

For a pretty version of this explorer with javascript || A note on/for services

NOTE: This explorer actively tests beta software in production. If it crashes, hooray! We found a bug! Please find a backup explorer for these instances.

The most up to date software for Monero are version: CLI v0.18.3.3, GUI v0.18.3.3

If you need to use a remote node, you should set up your own. Good guide for setting up a remote node.

High Fee Bug. Remote nodes can increase your tx fees. Double check before sending. Run your own node.

Autorefresh is OFF

Tx hash: 5a6bea61cf957509000497e12cce7e238dcac7074ed5714cc6d3a5cb0b10d9f4

Tx prefix hash: d63b60de87d56d54b5b53d60d5155f1a4268997cdd78ff6628de987dc57825a7
Tx public key: 23ba7e966f614967fd49125862d9503dbcd5ab03575d7f597949ef546123030e
Timestamp: 1415423293 Timestamp [UTC]: 2014-11-08 05:08:13 Age [y:d:h:m:s]: 09:192:09:56:14
Block: 295607 Fee (per_kB): 0.100000000000 (0.060341779611) Tx size: 1.6572 kB
Tx version: 1 No of confirmations: 2854676 RingCT/type: no
Extra: 0123ba7e966f614967fd49125862d9503dbcd5ab03575d7f597949ef546123030e

19 output(s) for total of 13.800000000000 xmr

stealth address amount amount idx tag
00: 0904ed90c46328b8ccd7db264acaec979615f48ac2b144d8f18664c84a4852a5 0.100000000000 622224 of 982315 -
01: 895c3fa81bb643de6db274d4ad04ff5b0f2a3f0c000fae642a3ef2ce6ee5083d 0.200000000000 603840 of 1272209 -
02: 71cdccfa41d47bfc0d13993ebdad58a0dc3370787bd09a72811fb914695ade7d 0.500000000000 440493 of 1118624 -
03: 844805ff1e00c0bd4d6b377d7df68e9adda6b0e7e06b6d628d43fcc39e543008 0.500000000000 440494 of 1118624 -
04: e5c92fdfc9113b9782e497388258f216a8d3efb84a41b35640c9ae28b3d72c3d 0.500000000000 440495 of 1118624 -
05: e35fcae30745f0a13290bd4193e7636bc75129af6ef0be521aead96c9db71109 0.500000000000 440496 of 1118624 -
06: 8ce207d4806014bb50fee767c6c35a41bc7d85840af128a04e51f2f06c2876bb 0.500000000000 440497 of 1118624 -
07: 2c924ebe61241879cb7bb9d60b3cd24a279eefa3e3a7ab42591501af8d35496c 0.500000000000 440498 of 1118624 -
08: 718e2a414b20076f427bdc21685e29b113df1befb3b98c925dd1e3a809e4a937 0.500000000000 440499 of 1118624 -
09: a364e1b53c9f09858a21cbdbc2c8c7ece60fc2c912822b80fbdbfe47dd5aacb1 0.600000000000 268291 of 650759 -
10: 032fef3eb352efd6215445d924f5e2bce4e10013fa5a3291176cb5015633ab7f 0.600000000000 268292 of 650759 -
11: d68787f2203e9b1c69a8ccf6252b4a5f3ae85b50cbabc8147402a493dd7763c9 0.700000000000 196707 of 514466 -
12: 6abd6d81826093c740ea52b99ba3e3046872a683184890edbd4eeb3a62dadd59 0.700000000000 196708 of 514466 -
13: ff443c0e789cbbeaf05289696a435abed388913b1459e5ba8bf14bfe6fed86d7 0.700000000000 196709 of 514466 -
14: 008b0eb21a88a7ded7cae00373fbf9dc9a2476aa737ae5aaa5e466c577ce12fe 0.700000000000 196710 of 514466 -
15: 014c8196da241a6f8cdd437cb1a2d990785165773439abd775917650588396dd 1.000000000000 328728 of 874627 -
16: 3071a7779308144d2623e5b78c4f6e9eb1755bee5a271ea5f1f4639f316b4bcc 1.000000000000 328729 of 874627 -
17: 845a350d6cf9e318bcbabc9bacf21aa0aa99f895cfb150862c6a6fd907e76ccc 2.000000000000 126734 of 434057 -
18: f6566a16adc8f57f4940a7e586323ef9177c98a11a1837893a170806844e945f 2.000000000000 126735 of 434057 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-04-26 04:53:24 till 2014-11-06 22:23:31; resolution: 1.15 days)

  • |_________________________________________*_____*_________*_______________________________________________________________________________________________________________*|
  • |________________________________________________*_______*________________*_______________________________________________________________________________________________*|
  • |_*________________________________________________________*______*_______________________________________________________________________________________________________*|

3 inputs(s) for total of 13.900000000000 xmr

key image 00: 7f07891def92368ee35cbc7df4454ce5de50cd1bf52011067b10e795b3621a26 amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: fa3e10e17342166f12c7ecded7fa7cc4947584b5a431b2900ac7906286bcfd12 00080808 1 5/76 2014-06-11 17:48:20 09:341:21:16:07
- 01: b047c5a9745cc9aeffcf2fc604762291f7e718828e3c9564df94106313376b40 00090355 1 7/19 2014-06-18 05:19:48 09:335:09:44:39
- 02: 7a408bdc3c51fe0fa73beae111bde7516881a23683811bd5a4bc85446a23a033 00107771 0 0/5 2014-06-30 06:03:54 09:323:09:00:33
- 03: ebd287af00a912f4a9bdb7b5369341a4e948177fe339f65c8cff5e5726b4d092 00292908 4 18/61 2014-11-06 08:07:13 09:194:06:57:14
key image 01: 185dd75c1c70a931569dbe69b1406971ef2c2e5fee5d1d13c1de545bd9ddcdf2 amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 891e19f13bb8b6a212b82820efe1860c5d63faa980258672b465bc4763c7b744 00093359 1 14/54 2014-06-20 07:30:23 09:333:07:34:04
- 01: 690ada5ed32316914571a5c15c9ff01f4e646b71f86fcf6e32f700cd8a8e73c1 00106021 1 10/62 2014-06-29 01:03:16 09:324:14:01:11
- 02: 70e1c5bd3e154f1d41ead357130e0054469c4842819d720a026b3bcc55a92506 00135171 4 5/6 2014-07-19 05:56:58 09:304:09:07:29
- 03: 2b6affa7f74dd5956ee94db0789b3e928ccc600a8bdbd5b45b97be40317b12bd 00293759 0 0/4 2014-11-06 21:23:31 09:193:17:40:56
key image 02: e1cba4bdc1e2d718969e21bdda2fd6b7805ddf7d32c266c0ddc5a0c2a389d87e amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ec13362414a4041d471ec8bde5bc288b5f1c70f1c56a32d590331bcc8cccb535 00011788 0 0/9 2014-04-26 05:53:24 10:023:09:11:03
- 01: 5c97af60e10529bec45c32462bf9b208fc609cdff0e1ec97ae740798dce6e55d 00110044 0 0/5 2014-07-01 18:56:05 09:321:20:08:22
- 02: a9fcaae59ce52e1f2e164ab5119cb17e918066fbd0da79c2cfaa31e9986db711 00121825 0 0/6 2014-07-10 00:15:16 09:313:14:49:11
- 03: e9f0d0fb40209e0801c0ec7e8282a26f410016408d989ad7c200f061e2d36136 00293340 0 0/4 2014-11-06 14:49:06 09:194:00:15:21
More details
source code | explorer version (api): master-2024-03-03-26331e6 (1.2)