xmrchain.net & Explore.Moneroworld.com & monerotools.i2p

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Mine on xmrpool.net to support the hosting of this block explorer and other services of MoneroWorld!

Check out the Open Node Directory

Go to the Testnet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly?

Autorefresh is OFF

Tx hash: 6e61fd0edefdb2b7fb9fb4770d219a598275bf6571228e255cc9908a6e9d794a

Tx prefix hash: bc879b384f34daf8020ffa73bc207e74e668d70c2d0c2fc9fa551757b34303bb
Tx public key: 3be84fd45222a3ebca29f5b85e1d2547331f94fecb1666930a790f5fa0f82b61
Payment id (encrypted): e6e9e6998e3cd140
Timestamp: 1567704727 Timestamp [UCT]: 2019-09-05 17:32:07 Age [y:d:h:m:s]: 00:092:23:57:48
Block: 1916622 Fee (per_kB): 0.000028230000 (0.000016331932) Tx size: 1.7285 kB
Tx version: 2 No of confirmations: 67197 RingCT/type: yes/4
Extra: 013be84fd45222a3ebca29f5b85e1d2547331f94fecb1666930a790f5fa0f82b61020901e6e9e6998e3cd140

2 output(s) for total of ? xmr

stealth address amount amount idx
00: f0b3aba0b90fa0b125421cc8303b779757f0f4c7c5860ff400c720410c0de93e ? 12193214 of 13634977
01: f31f3b783bc24f0d5a04fd5882897d98da69a7313a31f3e59f832cf8a3528aa8 ? 12193215 of 13634977

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2019-08-25 22:19:13 till 2019-09-05 14:44:31; resolution: 0.06 days)

  • |_*________________________________________________________________*_________________________________________________________________*_________*_*_____*________**____*__**|

1 input(s) for total of ? xmr

key image 00: af41a5901ae0a27b5243e36ba83541e4c77c2cf8fedf063f04c2bfe45f084268 amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 930db275445055488c8b52d6aca942ed566734fa081058c8c575cf9809388f56 01908880 11 1/2 2019-08-25 23:19:13 00:103:18:10:42
- 01: e7952ca52d1d02e5bcf51dd0a8fad9677d50ddc06228893fb0e5842a28bd8ea8 01911810 11 8/3 2019-08-30 02:24:38 00:099:15:05:17
- 02: 76b75dde2af7723390e0745f4412a10d38a716599543ca0ff2600002c852e734 01914833 11 2/2 2019-09-03 06:06:12 00:095:11:23:43
- 03: 1760e0e956d979210e8a7573fb971232b24e511cd94ca402d7c0f1a4f960d3b7 01915280 11 1/2 2019-09-03 21:01:35 00:094:20:28:20
- 04: 2c8f5ea44cfa5e7c85f84ea9acf06e447e0aaea2a9d20fe09fb362ffa106cec9 01915370 11 2/2 2019-09-04 00:23:37 00:094:17:06:18
- 05: 7c472cf2902f83f11f7e3947820a3ac0675f9c8ab334e6367cef37b040b70cb6 01915632 11 1/2 2019-09-04 08:43:27 00:094:08:46:28
- 06: 1fe7664796e294fee51b42f1f896035df67abc322127240f35fe083e29776303 01916063 11 1/2 2019-09-04 22:57:37 00:093:18:32:18
- 07: 44d508a45f01779e335da09f3b24e639a235f15fd369751335dfe0cb420f825a 01916108 0 0/1 2019-09-05 00:52:14 00:093:16:37:41
- 08: 7bfc7c5f4b3eac5b7933ef33661e4d5c495c32ff9b0721ca676d3584166f0c35 01916339 11 1/2 2019-09-05 08:15:51 00:093:09:14:04
- 09: 97c0c4d6d3cf43fb24095b336cc85d9ebb4838a68e507d8af19b1b27fd399508 01916471 11 3/2 2019-09-05 12:48:07 00:093:04:41:48
- 10: 8e80ea943fe84175be6cc376cdacf6c9b2ce7d0ca34a9e9935ff5ca18fd21c1a 01916505 11 2/2 2019-09-05 13:44:31 00:093:03:45:24
More details
source code | explorer version (api): master-2019-11-26-df6e3bb (1.1) | monero version: 0.15.0.1-6def88ad4