xmrchain.net & Explore.Moneroworld.com & monerotools.i2p

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Mine on xmrpool.net to support the hosting of this block explorer and other services of MoneroWorld!

Check out the Open Node Directory

Go to the Testnet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly?

Autorefresh is OFF

Tx hash: 65feb90cc5a28a20f0bd22dd4628eab5b6c8f7b255271ea57bf1ca2d208b84cd

Tx prefix hash: f6379e935f86af5f2d4d880e7e87c1a4d226e3071f5e9e46415930109480f20c
Tx public key: 8325aabbf77af554acaf1b8ce232f97d21395bcd9aa5a86dbf192d665426ed7c
Payment id (encrypted): b6ba641f556e9252
Timestamp: 1575344475 Timestamp [UCT]: 2019-12-03 03:41:15 Age [y:d:h:m:s]: 00:003:20:09:07
Block: 1980451 Fee (per_kB): 0.000944720000 (0.000544703423) Tx size: 1.7344 kB
Tx version: 2 No of confirmations: 2789 RingCT/type: yes/4
Extra: 018325aabbf77af554acaf1b8ce232f97d21395bcd9aa5a86dbf192d665426ed7c020901b6ba641f556e9252

2 output(s) for total of ? xmr

stealth address amount amount idx
00: e84179af96522eb2fd0ee5d3d800c0dca670703c2092ba6263b19754b5603a84 ? 13555173 of 13623970
01: 39e4bf160f2083af364923e3d9866f663f4c7b53ab8c6a2c2a2ba7e866e40c0f ? 13555174 of 13623970

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-07-10 07:22:18 till 2019-12-03 04:02:24; resolution: 5.15 days)

  • |_*________________________________________________________________________________________*__________________________________________*______________________________*__*_*|

1 input(s) for total of ? xmr

key image 00: a3999e99f72a0f60e1a5aada70fc223dd21e5603011c9dc32e10ecb948f58e00 amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6e429291973c00b21faa4693bff3e3a8c9fd0de54f13a6c240399d0ea00e35f3 01351025 0 0/1 2017-07-10 08:22:18 02:149:15:28:04
- 01: d576999d3ee10f0f68f6fb36c2f02f9bee7010f1a9b27bbaa688e3a84ff3b93d 01684292 7 3/24 2018-10-16 18:04:49 01:051:05:45:33
- 02: bf64db6351eab46dfba110a94241b789590b0d0cb24543c812bea188bb01d164 01843122 0 0/1 2019-05-26 14:35:28 00:194:09:14:54
- 03: b290b59af534d748dcc3bd9ca5ada6f2083d2f3fb1c51583870def5a7751882f 01960057 11 1/2 2019-11-05 03:41:09 00:031:20:09:13
- 04: 3690a3b536458e1f60853ef05707a81c7b00e3b7aa9f3c1fea2b4c2c3c295812 01969380 11 2/2 2019-11-18 04:01:45 00:018:19:48:37
- 05: da1b9a40df361de62c47e1c80f85673407878820ccfa77da3d906d4d6acee122 01979333 11 2/2 2019-12-01 15:55:09 00:005:07:55:13
- 06: 24d5faf5d75cec8971a6702e87224bcc77b8042675ece29a85010f4c7d7e0f38 01979453 11 2/2 2019-12-01 19:55:15 00:005:03:55:07
- 07: c2c06c511f0d89177515ca80a7a102f8c66425cbab72f0fa2ec8ea78cf5c852f 01979917 0 0/1 2019-12-02 10:34:06 00:004:13:16:16
- 08: deff28ce13516d7ff6be90290c767bbe4e7f9131b6b9a3c06abbc4859097e856 01980281 11 1/2 2019-12-02 22:31:16 00:004:01:19:06
- 09: f9da5d14624b44b7cfdacc93acac25aea5c05253929be926a87e42e06a394cef 01980290 0 0/1 2019-12-02 22:54:16 00:004:00:56:06
- 10: 818df54cd3456197ecc81b4f9f93d01e8ae433a47207dc743e577f7612faf13c 01980428 11 1/2 2019-12-03 03:02:24 00:003:20:47:58
More details
source code | explorer version (api): master-2019-11-26-df6e3bb (1.1) | monero version: 0.15.0.1-6def88ad4