xmrchain.net & Explore.Moneroworld.com & monerotools.i2p

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Mine on xmrpool.net to support the hosting of this block explorer and other services of MoneroWorld!

Check out the Open Node Directory

Go to the Testnet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly?

Autorefresh is OFF

Tx hash: 663ca4fdba077db7fee7a717a3730cad4ada185ba53ab54e655f19d784080611

Tx prefix hash: d9ae2841c2dc137e9a81fbf46dc22b8a8e3f8ab13d05370efe3ae219ac277f34
Tx public key: bf09c154948e1917303ddea088a2e0002f19d16501594ecc96a0b39c5c25c5da
Payment id (encrypted): 97014bda3a622af3
Timestamp: 1560089846 Timestamp [UCT]: 2019-06-09 14:17:26 Age [y:d:h:m:s]: 00:181:03:14:47
Block: 1853155 Fee (per_kB): 0.000031970000 (0.000018433153) Tx size: 1.7344 kB
Tx version: 2 No of confirmations: 130665 RingCT/type: yes/4
Extra: 02090197014bda3a622af301bf09c154948e1917303ddea088a2e0002f19d16501594ecc96a0b39c5c25c5da

2 output(s) for total of ? xmr

stealth address amount amount idx
00: c2b3b76a62c6c77785d2d2fccd38eaa26e7326c7716a0613197920a8915fffa3 ? 10674338 of 13634978
01: 9de46eb535ee2c89389b2f6331d9e8c7b033474be1f882fc2366684bfdf719fb ? 10674339 of 13634978

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-11-14 00:57:02 till 2019-06-09 14:44:11; resolution: 3.37 days)

  • |_*_____________________________________________*__________________________________________________________________________________________________________________*__***_*|

1 input(s) for total of ? xmr

key image 00: f35e6ed6e0cbd8f524aef2c1a0df38b54d5416ccc60ce08436777243e0393e20 amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c06417d4ae2f603cd128aaadd264a88af9064b1774a8ed0db3f15259a1c3866a 01442422 0 0/1 2017-11-14 01:57:02 02:023:15:35:11
- 01: d1ebd8c7094d9bc16807794b6c2590d9e6a8a26b93b89679113e7ae31f504209 01555952 7 2/2 2018-04-21 07:27:33 01:230:10:04:40
- 02: e2c27f6b4127992633707cc62ef83ee81cf9e5309ba1cdeef8564391c7081cf7 01835602 11 1/2 2019-05-16 02:48:28 00:205:14:43:45
- 03: e483668da55255483433be61e9529c477c4362b83249d90ea41630be91f9f8cb 01842407 11 1/11 2019-05-25 13:21:24 00:196:04:10:49
- 04: 2388e24764760b8a54f59f96b5de6101099ebdb3df04f6b01af19ccdeb90470c 01845085 11 1/2 2019-05-29 07:54:27 00:192:09:37:46
- 05: d67d9c37ccb2a2659416732f07aeebedcc6906d08553942fa52e3fa1c529cb33 01848006 11 2/2 2019-06-02 09:24:23 00:188:08:07:50
- 06: 16aa88f6d2bb7ca41057f99f626cf5558998761eccd5bf8634b33f74cf19fa38 01851196 11 2/2 2019-06-06 18:52:35 00:183:22:39:38
- 07: 4ff9ed2d58d4b830806286f489869cb37b3907ac544472fe40a76015c479fb3d 01852226 11 1/2 2019-06-08 05:07:25 00:182:12:24:48
- 08: 976518428e3cc6b0ea077e074e3e664d2f19c2993430903315771c161254720f 01852642 11 2/2 2019-06-08 20:25:04 00:181:21:07:09
- 09: 2d86f25bd87ebee848f7825eceeb15fcafc976f5a9d5dacec5d91f1b473c0ae9 01852713 11 1/2 2019-06-08 22:47:00 00:181:18:45:13
- 10: eced5dc2df06e15414c6b4f647b2cad67ddb1615907b2226e4bce3f7b1449be9 01853131 11 1/2 2019-06-09 13:44:11 00:181:03:48:02
More details
source code | explorer version (api): master-2019-11-26-df6e3bb (1.1) | monero version: 0.15.0.1-6def88ad4