xmrchain.net & Explore.Moneroworld.com & monerotools.i2p

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Mine on xmrpool.net to support the hosting of this block explorer and other services of MoneroWorld!

Check out the Open Node Directory

Go to the Testnet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly?

RANDOMX IS COMING

Tx hash: cab10b108c4444246da9320627a99693fac046ea9bf8e81c4fd8c01eb7f35c3e

Tx prefix hash: 9b96563ae46720240aa3c565c923b9dac4c052e138f8c83635d993b05f0e43ef
Tx public key: afc16f8b2f36339c262c578ee343b5d3ff17e28be6bac79d2914bbd1d087ea40
Payment id (encrypted): 603c750e988a10c5
Timestamp: 1573263491 Timestamp [UCT]: 2019-11-09 01:38:11 Age [y:d:h:m:s]: 00:009:10:30:47
Block: 1962859 Fee (per_kB): 0.000025860000 (0.000014952366) Tx size: 1.7295 kB
Tx version: 2 No of confirmations: 6763 RingCT/type: yes/4
Extra: 01afc16f8b2f36339c262c578ee343b5d3ff17e28be6bac79d2914bbd1d087ea40020901603c750e988a10c5

2 output(s) for total of ? xmr

stealth address amount amount idx
00: f4edfedf13006c9903163fbbf2ddf9e5ae4885010b240e6a2360013e6f1b2652 ? 13147985 of 13309394
01: 86b6b2628f3b93ad111685e017834556a9987cc094ffa19b5586e34a1cacf798 ? 13147986 of 13309394

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2019-07-29 07:31:10 till 2019-11-09 00:49:24; resolution: 0.60 days)

  • |_*__________________________________________________________________________________________________________________________________*______________________*___________***|

1 input(s) for total of ? xmr

key image 00: 9554df945e61797fe3720772a9cb2d1ac86821310e6f865da5599e600333eac6 amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a0189c8546a68ed4aeb4116df59c5f4d2f434c38ee44102bc0e98ca60d2b8758 01888991 11 2/2 2019-07-29 08:31:10 00:112:03:37:48
- 01: 725f8abdbc2508cb2e183fcaa6aa1a40e5fd84b6cdb8251a3c0b527e8343ecce 01946630 11 2/2 2019-10-17 11:08:21 00:032:01:00:37
- 02: bacda495053fdc99edbd8dbd5ed0cf9f1e77457bbc9082a00a0a68df102b926f 01956708 11 1/2 2019-10-31 12:13:03 00:017:23:55:55
- 03: 368a887e5c9f9d01bde41b7edcdcf60de95a71634f1f4fac4a257379725e587b 01961602 11 1/2 2019-11-07 07:53:59 00:011:04:14:59
- 04: 40cd8d3705fdd4a86708836fd2515079c41e37cf1eb4e7372f046a2f7287b3d2 01962060 11 2/2 2019-11-07 23:29:41 00:010:12:39:17
- 05: 800a15e6cbd25951421e91f73d21d3bc93d0a5e39ec1a11e22653fde79c5f703 01962557 11 13/2 2019-11-08 15:18:23 00:009:20:50:35
- 06: fedffa8824bf814b9e31d205a4ba40a29cdd5c14cdb6908627870755d8de8790 01962632 11 1/2 2019-11-08 17:15:40 00:009:18:53:18
- 07: da5d866a60388b2ed67344c34e6ff729018564d289465e91314bb2518145e56b 01962653 11 2/2 2019-11-08 17:56:47 00:009:18:12:11
- 08: 985be3ab627c45d5f9eccde1162c81116dca8651e3b7c81adce68f763f0e50f5 01962698 11 1/2 2019-11-08 19:35:05 00:009:16:33:53
- 09: 3a7e50f554677b5e734dce36c236b9e1185e0b3d922fb9a297d8699c293fae85 01962795 11 2/14 2019-11-08 23:01:08 00:009:13:07:50
- 10: 976750ce1be4b1f1937ca8cb327d8ae147c03a9d57a3fc06daac7ffdd83810f5 01962811 11 1/2 2019-11-08 23:49:24 00:009:12:19:34
More details
source code | explorer version (api): devel-2019-05-22-7fca3a5 (1.1) | monero version: 0.12.3.0-master-67a56a9