xmrchain.net & Explore.Moneroworld.com & monerotools.i2p

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Mine on xmrpool.net to support the hosting of this block explorer and other services of MoneroWorld!

Check out the Open Node Directory

Go to the Testnet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly?

RANDOMX IS COMING

Tx hash: bb7db120ac1020ade3e0f7a9aa73b428afa8077ce944981c8f5629e68f06662b

Tx prefix hash: 6458176fc94b9b5bc84613893810283d5c23a2c9eff62a553683ca5e5e5776c9
Tx public key: eacce3e432163d5252d02505465e0501030caff20c4e86f1914872edc770323b
Payment id (encrypted): 3024071f34a358f4
Timestamp: 1573263043 Timestamp [UCT]: 2019-11-09 01:30:43 Age [y:d:h:m:s]: 00:012:01:44:06
Block: 1962856 Fee (per_kB): 0.000025900000 (0.000014950169) Tx size: 1.7324 kB
Tx version: 2 No of confirmations: 8653 RingCT/type: yes/4
Extra: 01eacce3e432163d5252d02505465e0501030caff20c4e86f1914872edc770323b0209013024071f34a358f4

2 output(s) for total of ? xmr

stealth address amount amount idx
00: 026974c42fabfa468124dd337ed6d55214598791c2b95682dedbe73876ea160d ? 13147963 of 13357365
01: 2619573177592771c9c72411d6ad6617a55d6d25a92248e81d0c803aa9f6d042 ? 13147964 of 13357365

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2019-08-03 12:34:35 till 2019-11-09 00:42:56; resolution: 0.57 days)

  • |_*__________________________________________________________________________________________________*______*_____________________________________________*_______*__*___**|

1 input(s) for total of ? xmr

key image 00: 57c1795edd5949c6e293ecdcd08b2c1242f0d0351d9b61559fb777d4cd89ac55 amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ddc4b681490adf8a40a052fceada22569282a361d8a793f8b2d5b8f8a8a3de6c 01892743 11 1/2 2019-08-03 13:34:35 00:109:13:40:14
- 01: 3f030a96e0409dd9e04de023bddd0c96f66541accd122b0394d9e57a673790df 01934009 11 1/2 2019-09-29 22:55:03 00:052:04:19:46
- 02: f37644e14b217a654d2a4ef1a5abc79a5bead8fcb0ba86c1a47e76e848b1d315 01936836 11 1/16 2019-10-03 20:06:59 00:048:07:07:50
- 03: 70dd0845fd7a366aa0f2b5c616e4fb475f42cf42f00b5973e7a47be307a49d49 01956053 11 1/3 2019-10-30 13:04:33 00:021:14:10:16
- 04: 065dbead7354d9b9886154ccb69c848da5918d1099091dd1b0360e3716e8c414 01959285 11 2/2 2019-11-04 02:52:21 00:017:00:22:28
- 05: 4f5f4b0294106362b0da32d70aa65fdfbddadd9fc39e7c2728c5ee48c2909ece 01960529 11 1/2 2019-11-05 20:21:03 00:015:06:53:46
- 06: a38d6a4fa179c41bb23429a85081be63e9605780f5107eedba4b19ae9b1be43b 01962295 11 1/2 2019-11-08 07:07:37 00:012:20:07:12
- 07: e88931cb708a485073410c5aae297e1bb322a4543e924e8fb66c7c05e78486e4 01962464 11 1/2 2019-11-08 11:56:25 00:012:15:18:24
- 08: 30cb7e4cebcc47a484ec891dc8177a37a8be22b719b553b35c0eb85aa8dad9fc 01962511 11 1/16 2019-11-08 13:28:53 00:012:13:45:56
- 09: a4fbf8fd4e7b6dcd03c8e26b4026bab94505c93a6b9c505789204439e79fb726 01962650 11 1/2 2019-11-08 17:52:02 00:012:09:22:47
- 10: 4e588eee4245d20b0d3c24da8a9fce79319db01bcbe460712e564bc6d5a14d17 01962808 11 2/16 2019-11-08 23:42:56 00:012:03:31:53
More details
source code | explorer version (api): devel-2019-05-22-7fca3a5 (1.1) | monero version: 0.12.3.0-master-67a56a9