xmrchain.net & Explore.Moneroworld.com & monerotools.i2p

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Mine on xmrpool.net to support the hosting of this block explorer and other services of MoneroWorld!

Check out the Open Node Directory

Go to the Testnet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly?

Autorefresh is OFF

Tx hash: 96ef022099c38567f8cfaaece62dcd403ab928c0f826502750f6271fd2e0dd20

Tx prefix hash: 1b728b560c98b21bcb80feff52e1c3b1c1b73d78b6f5b388e0ac7bf3e5b75329
Tx public key: 0255fa0f76f583d3a90cb32cdaf353ecebc883b3c302f85e44cca5a683c04f5e
Payment id (encrypted): 4b2144780488d0c8
Timestamp: 1575343837 Timestamp [UCT]: 2019-12-03 03:30:37 Age [y:d:h:m:s]: 00:002:21:55:35
Block: 1980445 Fee (per_kB): 0.000025050000 (0.000014459526) Tx size: 1.7324 kB
Tx version: 2 No of confirmations: 2103 RingCT/type: yes/4
Extra: 010255fa0f76f583d3a90cb32cdaf353ecebc883b3c302f85e44cca5a683c04f5e0209014b2144780488d0c8

2 output(s) for total of ? xmr

stealth address amount amount idx
00: b76ca72c2e6595f1a3c7eb6489d3ad3f477b1d3e30a11584a47c495be1c5ef10 ? 13555106 of 13610157
01: f84790c18519cf11cd8ddb34daf5740665d722c1fd78c41a7f5402c18c2354a2 ? 13555107 of 13610157

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2019-03-04 13:01:49 till 2019-12-03 04:10:47; resolution: 1.61 days)

  • |_*_________________________________________________*____________________________________________________________________________________________________*______________***|

1 input(s) for total of ? xmr

key image 00: 7adb5b67853b55654cd4f6fba8f71f03b3b43184b5dfece5ed58cff2a6dd1db0 amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e3801ae2c8ac3775f4111f4e2c8d1d48efa75e350343c684717b174abfda2113 01784282 11 4/2 2019-03-04 14:01:49 00:276:11:24:23
- 01: 9557c8de1580a3ba8f7d4787dc50fff11c75bdc78cc79e099f948e3bfd7c8767 01842166 11 1/16 2019-05-25 06:13:51 00:194:19:12:21
- 02: fdd692ac7434d1d186bdb6335385b600e96e5f89a49476e18d4bbeef493e3017 01960129 11 2/2 2019-11-05 06:24:20 00:030:19:01:52
- 03: e09bd196863bc0fadde8a4fa3d239512716267c0060dadaba7bc3f4d7b81890e 01976928 11 1/11 2019-11-28 15:44:15 00:007:09:41:57
- 04: 182a98217d88df9530a27deed6912d3756aff0145e7b67c352d6426a5adc0a1d 01978326 11 1/2 2019-11-30 15:29:29 00:005:09:56:43
- 05: 68b2c025cc17a9eceb3e51c10f1fbd554911cf80651b89bc392eadf72f5817fb 01979685 11 5/2 2019-12-02 02:46:24 00:003:22:39:48
- 06: 399d18c008b331f7ad3500b98a739779bfd961d714a6d493232a5e483be0e799 01980146 11 2/2 2019-12-02 17:40:55 00:003:07:45:17
- 07: 44f540962f1134c22de6370567bb34d9dbff2b566a87fbc31d0eb3926fd6bbdf 01980175 11 1/2 2019-12-02 18:40:36 00:003:06:45:36
- 08: b30e4779f987474a8bdc552a2d5dbecb691370c3a2724b34e1822fc3cd6d095d 01980372 11 2/14 2019-12-03 01:16:44 00:003:00:09:28
- 09: 0fc1724597acb4d53e606413144dbf62cc963a9ff9fa83f6e255568c38e32bc5 01980425 11 2/2 2019-12-03 02:57:02 00:002:22:29:10
- 10: 367d7188db419ffc9c56a4c22ec61fffee0c0eb0db066544a69c9dd5692133a1 01980433 11 1/2 2019-12-03 03:10:47 00:002:22:15:25
More details
source code | explorer version (api): master-2019-11-26-df6e3bb (1.1) | monero version: 0.15.0.1-6def88ad4