xmrchain.net & Explore.Moneroworld.com & monerotools.i2p

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Mine on xmrpool.net to support the hosting of this block explorer and other services of MoneroWorld!

Check out the Open Node Directory

Go to the Testnet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly?

Autorefresh is OFF

Tx hash: bdd970de4f5c62b3e88ea83747941bbc7d71d4f07bfd8c773489b122c0312649

Tx prefix hash: 229313dd87f08311724aec5dbddb726dd3022221145d0ec513b6effc47809ff0
Tx public key: 123e7ff7fafb1b34201ba9cff4c182550b5ab2b782dad66ac8de3fb9ec279718
Payment id (encrypted): a3fce1f7fef84a57
Timestamp: 1575343837 Timestamp [UCT]: 2019-12-03 03:30:37 Age [y:d:h:m:s]: 00:002:21:58:18
Block: 1980445 Fee (per_kB): 0.000025020000 (0.000014458510) Tx size: 1.7305 kB
Tx version: 2 No of confirmations: 2105 RingCT/type: yes/4
Extra: 01123e7ff7fafb1b34201ba9cff4c182550b5ab2b782dad66ac8de3fb9ec279718020901a3fce1f7fef84a57

2 output(s) for total of ? xmr

stealth address amount amount idx
00: 643df61036230311ddcf6d8746c1dcc56f866cf542405ea12ab64d734ea8e993 ? 13555110 of 13610171
01: 8ae939097c95501bd290638f976077b742761b17cdea90d46976493c284dec7f ? 13555111 of 13610171

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2019-06-10 22:17:08 till 2019-12-03 04:10:47; resolution: 1.03 days)

  • |_*_______________________________________________________________________________________________________*_____________________*______________________________________*_**|

1 input(s) for total of ? xmr

key image 00: 5f14028cc924e3b7e14de6616338c002b6f664980f796049e7b969fbcd0f5566 amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b7d4f0b5e3a99d60465ce3b8b9803b80334c993213b03b7c3233b079aca254c1 01854179 11 1/2 2019-06-10 23:17:08 00:178:02:11:47
- 01: c8a1ed7dc8f6c91fad8ad2946b011ead2af0ec46416e867d53e10643312d787a 01932432 0 0/1 2019-09-27 18:27:37 00:069:07:01:18
- 02: 2c62ce17f70a77d3419e658dae83fc4592206ae41d2f4b896143828e9c9e3cb9 01948465 11 1/2 2019-10-20 00:23:09 00:047:01:05:46
- 03: cc65042579dafe199edda20159b96a3b590191fe85a9c04551c209ab82b00658 01977465 11 2/2 2019-11-29 09:51:30 00:006:15:37:25
- 04: 6c79458e58c038d83adfc8e8968d3e3e268243a95e28975c09294bc65fbbeb1d 01979273 0 0/1 2019-12-01 14:05:51 00:004:11:23:04
- 05: f365fe63961b81cfc85345d74cecc8b710e19ed35f469191b74680d1f1ed3765 01979425 11 1/2 2019-12-01 18:48:59 00:004:06:39:56
- 06: f4de0a6b0115772f424857485e70440f3d49743a813df3f8f2df46cc42a72b67 01980250 11 1/2 2019-12-02 21:27:56 00:003:04:00:59
- 07: b7a565bf819ef120908d359ef0a92d8d81b8e54d7190ee8e020f0ca7711018e5 01980333 11 2/2 2019-12-03 00:08:16 00:003:01:20:39
- 08: f452a39be021a0e679176f1fc5974bd79e639d3cfc47747b5812f910fb830d31 01980351 0 0/1 2019-12-03 00:36:00 00:003:00:52:55
- 09: e97dc23aa96ee1b0693c8fc83c9420f2dadeb7b15f4eb6580c8d29b54410ff2d 01980406 11 5/16 2019-12-03 02:17:05 00:002:23:11:50
- 10: 8283061f9dd993ce6226c33ad39f53e25cdc0650d876d300e975519bbdcafb6f 01980433 11 1/2 2019-12-03 03:10:47 00:002:22:18:08
More details
source code | explorer version (api): master-2019-11-26-df6e3bb (1.1) | monero version: 0.15.0.1-6def88ad4