xmrchain.net & Explore.Moneroworld.com & monerotools.i2p

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Mine on xmrpool.net to support the hosting of this block explorer and other services of MoneroWorld!

Check out the Open Node Directory

Go to the Testnet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly?

Autorefresh is OFF

Tx hash: 63f60063c2a398534fb9be7d5902fb27d8e9f8244b80de24bc52f7bd61fb57b6

Tx prefix hash: 1032d25926418d68d7ff6637bd250cdc1e7c573b0f606297dc0cdf6e7b13f86f
Tx public key: 54dec1c32dcf095f906ecb9375e6f6271dfecad9e92211c46a9329aa02fa5554
Payment id (encrypted): c4ce3408d82efbad
Timestamp: 1575344233 Timestamp [UCT]: 2019-12-03 03:37:13 Age [y:d:h:m:s]: 00:002:21:50:33
Block: 1980448 Fee (per_kB): 0.000944720000 (0.000544703423) Tx size: 1.7344 kB
Tx version: 2 No of confirmations: 2102 RingCT/type: yes/4
Extra: 0154dec1c32dcf095f906ecb9375e6f6271dfecad9e92211c46a9329aa02fa5554020901c4ce3408d82efbad

2 output(s) for total of ? xmr

stealth address amount amount idx
00: b01f2e3855322352800f6b3aa5f790c1e468d2f00339335bb1dec7c0bb3e997d ? 13555152 of 13610171
01: 2718b809aef8139f51b67b098388af7068a987042b6264df0339c54b7f7c048f ? 13555153 of 13610171

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-12-01 19:36:37 till 2019-12-03 01:24:50; resolution: 2.15 days)

  • |_*______________________________*_________________________________________________________________*___________________________________________________________________*_**|

1 input(s) for total of ? xmr

key image 00: 2b4fb5be685df2b2d3e77954c0ca4a45859eafa7e7aee07bac458cdd7c701787 amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3fb7a499ffcfdd2ba4af308648c89488acde15f7554e55dfea77900f40bbc35d 01717279 11 1/2 2018-12-01 20:36:37 01:004:04:51:09
- 01: 17ab5b223c7fd7dfaa1af7e81cfeecbfa438e376dfdaf10c9f9901d373d5433c 01766782 11 1/2 2019-02-08 06:59:09 00:300:18:28:37
- 02: 0e9ef9a4bacecdb876b2a3d8de5a81d24c71b6e5a8133bc7528e83d3d58332bc 01868324 11 2/2 2019-06-30 14:22:09 00:158:11:05:37
- 03: 97313cadb2938e2220c29e185c9adca8e60f97d198a42374d74af1b7d9e5feb5 01975126 11 2/2 2019-11-26 04:39:16 00:009:20:48:30
- 04: e71e9145dfca509c15c9f4b5f9376a74dbde16c48e97f1b350dc7dddf9535bdd 01977274 11 1/2 2019-11-29 03:33:36 00:006:21:54:10
- 05: 8c8873cc40f9d7b274a1a74078264ae63565dcdab13cf30d71f82bc421b8e0a6 01977450 11 1/2 2019-11-29 09:15:03 00:006:16:12:43
- 06: 66ce89387b73d0ee7a15de87dff3be5e9497f29754b758c2710b6556685a2f7c 01979660 11 1/2 2019-12-02 02:01:11 00:003:23:26:35
- 07: df4687f6f1a9222ec6ea28c3c902b244782400b862a31a6e032cceef403e1c8d 01979940 11 1/2 2019-12-02 11:26:49 00:003:14:00:57
- 08: bdd51bed1145c3ae7878959fab7b1c84c604e50d25d8e3270dd9396b9cc1b7b9 01979985 11 2/2 2019-12-02 12:43:34 00:003:12:44:12
- 09: 57f01f100ff4f7e4bbd1fe2d1a58ccb69bd89e880db1d0c6df11b5f41ffe274a 01980126 11 1/2 2019-12-02 17:10:14 00:003:08:17:32
- 10: 5bd6c398b433b69ed18f1f6520d55b05d8742d9ec907f7fee8256ea842920109 01980340 11 1/2 2019-12-03 00:24:50 00:003:01:02:56
More details
source code | explorer version (api): master-2019-11-26-df6e3bb (1.1) | monero version: 0.15.0.1-6def88ad4