xmrchain.net & Explore.Moneroworld.com & monerotools.i2p

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Mine on xmrpool.net to support the hosting of this block explorer and other services of MoneroWorld!

Check out the Open Node Directory

Go to the Testnet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly?

Autorefresh is OFF

Tx hash: 648f674a7cc919378592513de5d00f5a618baa059797c6f6e7a148563579a781

Tx prefix hash: 0e4db827916a81c90571fa156be678fa71bfdf9b7a65816cae8e4f23f1088481
Tx public key: b34c568f34f75b547651438c7a10739dd2b5b7f8a47db0a3131717303ebdae66
Payment id (encrypted): 796437ba3ba0e537
Timestamp: 1562854736 Timestamp [UCT]: 2019-07-11 14:18:56 Age [y:d:h:m:s]: 00:149:03:14:51
Block: 1876222 Fee (per_kB): 0.000230510000 (0.000133131551) Tx size: 1.7314 kB
Tx version: 2 No of confirmations: 107601 RingCT/type: yes/4
Extra: 020901796437ba3ba0e53701b34c568f34f75b547651438c7a10739dd2b5b7f8a47db0a3131717303ebdae66

2 output(s) for total of ? xmr

stealth address amount amount idx
00: f16f2085e8fa95d902f7946992ec4be37e923e84ab6f1b13a0f7d85fce0b81bd ? 11306101 of 13635028
01: f01b4f86035ee9e548148c193c22c4f68de2fb4a2142e21f61bf4dfb45d183bf ? 11306102 of 13635028

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2019-02-24 23:57:34 till 2019-07-11 13:50:26; resolution: 0.80 days)

  • |_*_______________________________________________________________________________________________________________________________*______________________________*___*_*__*|

1 input(s) for total of ? xmr

key image 00: dfe80ccd9fde60aed865948217264a8525b8a50538dd882b7478e953080ee293 amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6fc0f13f0234af253d7e87851fa1347952a607739a7d2729b4cb88fd8ed08adb 01778802 11 2/2 2019-02-25 00:57:34 00:285:16:36:13
- 01: b22ced19ebb0f652548859b09bb1a933ba09c2a30914e5aef9b2e8b5c78c6399 01852656 11 1/2 2019-06-08 20:58:04 00:181:20:35:43
- 02: 52bb81f742124755feab6fbb277c205475d982d5bd37a2b50be008af12e87c59 01870746 11 2/2 2019-07-03 23:48:28 00:156:17:45:19
- 03: bcde7213e9654ca844f0d5dbee8f29dba711408cea262fbf2b4cb6c85f4a8287 01872770 11 2/3 2019-07-06 19:59:28 00:153:21:34:19
- 04: 454b4a69ababcf20d255da5009129350b510c7f1b12c43f24a640951254b5c92 01874194 11 1/2 2019-07-08 19:30:46 00:151:22:03:01
- 05: c52471db6f8a427914c308830eb5c1d4da05f21651b8ee483de6bda80eaef5c5 01875846 11 2/2 2019-07-11 01:58:12 00:149:15:35:35
- 06: e83bedebe3c0d825e439185a9a3384bc33ef4634f5b6f17ddb846afc5b69db64 01875918 11 1/14 2019-07-11 03:53:43 00:149:13:40:04
- 07: b9c863aeb2644db5769232203c2481f73c5a283cb232589823b1e01d5b85cc2c 01875946 11 1/2 2019-07-11 04:49:12 00:149:12:44:35
- 08: 2f0913d0440bfd195071763764ab39d3600c535e58721231f3e9b00a8591186f 01876051 11 16/16 2019-07-11 08:06:08 00:149:09:27:39
- 09: 6c300722ab0b6922d4a3f327aae1d959b31d5d9fae049f3d8d57b3d384a5a465 01876149 11 1/2 2019-07-11 11:33:35 00:149:06:00:12
- 10: 0bf37338cacbf40cb896017b1de4ec83f614acde23d24da08521ce767879ab17 01876177 11 2/2 2019-07-11 12:50:26 00:149:04:43:21
More details
source code | explorer version (api): master-2019-11-26-df6e3bb (1.1) | monero version: 0.15.0.1-6def88ad4