xmrchain.net & Explore.Moneroworld.com & monerotools.i2p

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Mine on xmrpool.net to support the hosting of this block explorer and other services of MoneroWorld!

Check out the Open Node Directory

Go to the Testnet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly?

Autorefresh is OFF

Tx hash: bfcd8f8db529b936874ffc3e27165662be096fdc6aab97fc5c47b7496fd15821

Tx prefix hash: a3a7996bd8aaac44fe5a711308a5226430abf032900e511eb26210b952c32be9
Tx public key: a0ae17484242fe11e4267b8809681d7c4abb954bd58688692a81995e9ab0ff80
Payment id (encrypted): a55e4e6846c564cd
Timestamp: 1575344475 Timestamp [UCT]: 2019-12-03 03:41:15 Age [y:d:h:m:s]: 00:002:21:48:40
Block: 1980451 Fee (per_kB): 0.000025060000 (0.000014457149) Tx size: 1.7334 kB
Tx version: 2 No of confirmations: 2100 RingCT/type: yes/4
Extra: 01a0ae17484242fe11e4267b8809681d7c4abb954bd58688692a81995e9ab0ff80020901a55e4e6846c564cd

2 output(s) for total of ? xmr

stealth address amount amount idx
00: 34359b069c2b67e09877a8df95bbf842c23b0e4e73404d69508aa8e76ba15e35 ? 13555179 of 13610176
01: 6208a835f34546b04b5f7859c30855269705d4e250152642122725daac333dce ? 13555180 of 13610176

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-12-10 12:55:03 till 2019-12-03 02:51:07; resolution: 2.10 days)

  • |_*___________________________________________________________________________________________________________________*_____________________________________________**_**_*|

1 input(s) for total of ? xmr

key image 00: 02782ff41e44c11af959ee0f9bd7fe74ec8d094085321dcbdd0937df7be21faa amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 55483f05aeb81761b34ef8966e96da4869ab7948e479d0fbf013cab984427aa8 01723532 11 1/2 2018-12-10 13:55:03 00:360:11:34:52
- 01: e820b7f2da3b104afb4719b839e54a7e53fe3fcfb32d70b2e504c8ff999b2324 01900825 11 2/2 2019-08-14 19:03:22 00:113:06:26:33
- 02: bfff86691913281f72a13d4f0f921d579a05e5916eb940f8b51c4d16021a1f34 01970359 0 0/1 2019-11-19 14:08:47 00:016:11:21:08
- 03: 52952365d4468d254155be685ec2e44726fd3e5bfdd51e0439c3fcb6e0a0e4fa 01970994 0 0/1 2019-11-20 12:02:35 00:015:13:27:20
- 04: 4fa3c87e69ac21a5abb6812e4253ded9f01ba66e3c5b037d9c4c46d7fb98a8d9 01975216 11 2/2 2019-11-26 07:27:18 00:009:18:02:37
- 05: 1efc050489dc6c79193d6a62a0bfdf4b7360442dea7c42860725c27206d8f29a 01975727 11 2/2 2019-11-27 00:05:10 00:009:01:24:45
- 06: 0b309f196a118a9dd4a4dfb7475042ae9fa97ed0ad21c1445cd4dc3cdcc4c13c 01976845 11 2/2 2019-11-28 13:09:39 00:007:12:20:16
- 07: 7af6c7ddb4c78036c4cfceaf9c30d6105bbc4c24fbbfa458a8f257309c8cd371 01979310 11 2/12 2019-12-01 14:58:58 00:004:10:30:57
- 08: f48de88429a7a01c92ac7a0a03e7da1d79739e6988820f7de49b21a8ce31b2b9 01980146 11 2/2 2019-12-02 17:40:55 00:003:07:49:00
- 09: a6123a9d87d2f81f4c470f845bd5f2a12120e3ae6f0045760c311044b9d97aca 01980325 11 3/2 2019-12-02 23:52:18 00:003:01:37:37
- 10: 6edc277b8722158d713858e14032241b1051e7be3a23c67fcef13749681497d6 01980393 11 2/2 2019-12-03 01:51:07 00:002:23:38:48
More details
source code | explorer version (api): master-2019-11-26-df6e3bb (1.1) | monero version: 0.15.0.1-6def88ad4