xmrchain.net & Explore.Moneroworld.com & monerotools.i2p

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Mine on xmrpool.net to support the hosting of this block explorer and other services of MoneroWorld!

Check out the Open Node Directory

Go to the Testnet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly?

Autorefresh is OFF

Tx hash: 5f56399118eab2d9a723f9bc0ef6532270375081f24221fc5c7867fb6a008a3e

Tx prefix hash: 0f03cae323e191ed80149a6e9789d80be20ff45dc59b12a96766e9c643d1d648
Tx public key: 6b773d3f915695f9e87fbb659c82f9052fc3dc335b89569dca3ec285c1e651c0
Payment id (encrypted): 480c6727fbbb112a
Timestamp: 1561995906 Timestamp [UCT]: 2019-07-01 15:45:06 Age [y:d:h:m:s]: 00:159:01:47:33
Block: 1869070 Fee (per_kB): 0.000161320000 (0.000093381391) Tx size: 1.7275 kB
Tx version: 2 No of confirmations: 114751 RingCT/type: yes/4
Extra: 020901480c6727fbbb112a016b773d3f915695f9e87fbb659c82f9052fc3dc335b89569dca3ec285c1e651c0

2 output(s) for total of ? xmr

stealth address amount amount idx
00: 22055106d466b4f68dceef13b2a39d30715e68727f7fc86095fb9f6d80302c54 ? 11135251 of 13635012
01: 12f5c41836baf000359b94670c0b47d162345d2faeab48e29cd83e094998d0d4 ? 11135252 of 13635012

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2019-06-09 22:43:44 till 2019-07-01 15:06:34; resolution: 0.13 days)

  • |_*______________________________________________________________________________________________*________________________________________________________*_*_*______**__**|

1 input(s) for total of ? xmr

key image 00: 45cf4f19f713aac7ac07af6c149210a1afc101d8652dc7cf6a1ef50214053f79 amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 20b0df5ba06377640b481b141c39975aa64ca792cf3b60fcca88492f532e5a7d 01853423 11 2/2 2019-06-09 23:43:44 00:180:17:48:55
- 01: c7c812f80e0792f92d857467712e25c2f9203514fca0a63c3b2ffd6d7d02869e 01862301 11 1/2 2019-06-22 05:28:41 00:168:12:03:58
- 02: 7c56cf8b8e9bf44bba2a09d5bc4e2816f49bc263ec53bbcf149f05f13788d477 01867487 11 1/2 2019-06-29 11:40:41 00:161:05:51:58
- 03: e2c4415c099a1facf0ca9b4ba202440a26a108803b999f092f0cc4b433455424 01867697 11 1/2 2019-06-29 18:43:28 00:160:22:49:11
- 04: 324385a659bd1b3de034ff7cd3f17d30cd741f8f4659bb423f8bfc77500c71bd 01867871 11 2/2 2019-06-29 23:40:49 00:160:17:51:50
- 05: 2f66d2383c9fb987879fca225c5758dcebf5d0ec0dcf2d8c7ea47c1ea87eb888 01868538 11 1/2 2019-06-30 22:08:25 00:159:19:24:14
- 06: 9ede8b409c4b8b300d2c67c333f4121c0d2c0b036c27083e0961c66f924087e5 01868623 11 1/2 2019-07-01 01:17:28 00:159:16:15:11
- 07: 14edfe83bad9784ca3f01e6dd4acf1159d7aea5741ec6c246ecbc771cca09ee6 01868628 11 2/2 2019-07-01 01:19:28 00:159:16:13:11
- 08: 923b65f589112e27eb38d60796e5a5e60161c87a8b5f70a9949c8a8968d2cd64 01868650 11 1/2 2019-07-01 02:04:12 00:159:15:28:27
- 09: 9e8eb186fce78076cf6bb045de633b7c525959a600586bb63b15836b0ee0df0c 01868938 11 1/2 2019-07-01 11:38:18 00:159:05:54:21
- 10: 1205745d77724b4ba5ae94c2a29469dd5b94351e680f11f97a0c8df97ca50b99 01869009 11 1/2 2019-07-01 14:06:34 00:159:03:26:05
More details
source code | explorer version (api): master-2019-11-26-df6e3bb (1.1) | monero version: 0.15.0.1-6def88ad4