xmrchain.net & Explore.Moneroworld.com & monerotools.i2p

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Mine on xmrpool.net to support the hosting of this block explorer and other services of MoneroWorld!

Check out the Open Node Directory

Go to the Testnet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly?

Autorefresh is OFF

Tx hash: bbe2c7ad296fd6d26f02d8b243f767237e56f72087051fbaa8943bf891b375af

Tx prefix hash: 61f330f5b842e18a6aa668b2587bc2834c3c7623ca42d0262761d491b9978176
Tx public key: ca113e54a0fab48599bd86e39d2af590ae9b3f6b6677487925e1f8b30027aeb2
Payment id (encrypted): a4b93b423fde555d
Timestamp: 1575343941 Timestamp [UCT]: 2019-12-03 03:32:21 Age [y:d:h:m:s]: 00:002:21:58:46
Block: 1980446 Fee (per_kB): 0.000025030000 (0.000014456131) Tx size: 1.7314 kB
Tx version: 2 No of confirmations: 2106 RingCT/type: yes/4
Extra: 01ca113e54a0fab48599bd86e39d2af590ae9b3f6b6677487925e1f8b30027aeb2020901a4b93b423fde555d

2 output(s) for total of ? xmr

stealth address amount amount idx
00: 025a6c3e487cd882c3dfa9114a845143a83e1f578813621039e915a90c9daa09 ? 13555131 of 13610189
01: ab18ffb4621fc177b78ea1afab6f91fd50e63411e573f37dbb17d3503c93ee5b ? 13555132 of 13610189

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2019-05-10 17:36:11 till 2019-12-03 02:51:07; resolution: 1.21 days)

  • |_*____________________________________________________________________________________________________________________________________________________________*_____*__*_*|

1 input(s) for total of ? xmr

key image 00: 206b648586eaafd16b5abb0ce6aa718835dbd3b87e456e978bc5b9ae5b2a862c amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 96bf4914774251881ecc5ebd9ee406cab9ab2b6a7ccf554887c22722e7669faa 01831781 11 1/2 2019-05-10 18:36:11 00:209:06:54:56
- 01: 7b8ebad1527ad31d73701dc706ad57bfe74587a16148763374fc4d154b0dee6c 01970009 11 2/2 2019-11-19 02:20:16 00:016:23:10:51
- 02: 699ba0354db7ed88c7d18b19147fbd4722a4898729777729e57a298ee3cbb508 01975551 11 5/2 2019-11-26 18:38:11 00:009:06:52:56
- 03: fa3044e7fd8a0e47ce76230aacaa6e9d6ecf15086e5ca4fa8ba17ea4c6ae31a0 01977691 11 2/2 2019-11-29 17:41:21 00:006:07:49:46
- 04: 1a7da9284f37ca051c237f9b989e558f7f050fe177db10ab4352db8751403776 01978063 11 2/2 2019-11-30 07:03:29 00:005:18:27:38
- 05: 959ebf3b7cc409ab0d8d3e725ece1d29c9edcca060b7f0ecdd8b7b2d2c8463f6 01978222 11 1/16 2019-11-30 12:07:31 00:005:13:23:36
- 06: 77f438cef488afc9e549f976ec50510dc5fbd2f742ccba5d26ef2a7b3aaa4e7b 01980029 11 2/2 2019-12-02 14:17:03 00:003:11:14:04
- 07: 028c1b2b978e800bcb55f21b5fd22c19b7b8333d0c647601e945dc9febe28500 01980128 11 1/2 2019-12-02 17:13:49 00:003:08:17:18
- 08: 61e7350a13dc2105830db3668c709688676c0366fb320e067458597a0b8723f5 01980337 11 2/2 2019-12-03 00:14:32 00:003:01:16:35
- 09: 4498eaf6591c78dac83ce63bd2b335183c77482485615d3e966b597f2c2b8ea1 01980383 11 2/2 2019-12-03 01:33:59 00:002:23:57:08
- 10: ca7e430bed65336c053c2ddbcd57b97e7ba6d31d60ac8624a75f4fa8a82f30e5 01980393 11 2/7 2019-12-03 01:51:07 00:002:23:40:00
More details
source code | explorer version (api): master-2019-11-26-df6e3bb (1.1) | monero version: 0.15.0.1-6def88ad4