xmrchain.net & Explore.Moneroworld.com

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Solo mine on your own blockchain to support the monero network!

Public Node Directory || Monero Block Frequency Tool || Monero Website || Make Monero Better!

Monero Testnet Explorer || Monero Stagenet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly? Monero FAQ

Moneroblocks Explorer || Monerohash explorer || Map of Monero Network

For a pretty version of this explorer with javascript || A note on/for services

NOTE: This explorer actively tests beta software in production. If it crashes, hooray! We found a bug! Please find a backup explorer for these instances.

The most up to date software for Monero are version: CLI v0.18.3.3, GUI v0.18.3.3

If you need to use a remote node, you should set up your own. Good guide for setting up a remote node.

High Fee Bug. Remote nodes can increase your tx fees. Double check before sending. Run your own node.

Autorefresh is OFF

Tx hash: cc9c15ee74e233bdacfeff29513b48b0361ebbdece09f2acff1df19c26d44051

Tx prefix hash: 4fb7f4cad13dd55b0b22065effbc92012a246665fded6295632ebe861bbbf727
Tx public key: 80cd7582438ecea8759a028023c0f189595dc1255f9b954378d824edb50ba62a
Payment id (encrypted): 4023335961e0cd34
Timestamp: 1481737367 Timestamp [UTC]: 2016-12-14 17:42:47 Age [y:d:h:m:s]: 07:144:01:57:21
Block: 1201330 Fee (per_kB): 0.020406260000 (0.013166988179) Tx size: 1.5498 kB
Tx version: 1 No of confirmations: 1941159 RingCT/type: no
Extra: 0180cd7582438ecea8759a028023c0f189595dc1255f9b954378d824edb50ba62a0209014023335961e0cd34

9 output(s) for total of 1.315293740000 xmr

stealth address amount amount idx tag
00: 909e3ad34d05036440a24f102f1ffd9c7e832611f6916f5ca564c41bdcd12844 0.000000040000 15324 of 22714 -
01: 90b88437b4470c325be82bb0e5787a2ec5c55b182504891a013eaeb30873c7ec 0.000000700000 15091 of 22578 -
02: c5e665c82b3666188ac5cb9058e2e1a0afb583272c9dff378850fcf576e1507a 0.000003000000 34717 of 42340 -
03: 098c863cb0b77faa20360c95656e217b0ccb574deb0db0849d5b58f7f22ff5db 0.000090000000 53117 of 61120 -
04: 96b109ea1c619fa3e467311f10de3bc3c827694a7d93b3a1b861856aa38913e3 0.000200000000 67994 of 78037 -
05: 2a3266ddcfc334f5aaf91e90c881e88de7c0401bac9e1be5eb06d7643a4607fe 0.005000000000 294903 of 308584 -
06: 772b393608372c0280cf64e08aa1825e35e9a9048cd4035ef9a81c4df64d1627 0.010000000000 483021 of 502464 -
07: bd408caceb0253a0ff1b4f591a0ed89532389c02f47ffc034a58bb76237c6637 0.500000000000 1096295 of 1118624 -
08: 78ae5e5756ee053ad4ade5f02eeb079bf1e0783df50370e0171c46fc64105612 0.800000000000 475585 of 489955 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-26 21:10:28 till 2016-12-14 18:21:10; resolution: 5.49 days)

  • |_**______________________________________________________________________________________________________________________________________________________________________*|
  • |___*__*__________________________________________________________________________________________________________________________________________________________________*|
  • |____*________________________________________________________________________________________________________________________________________________*___________________*|
  • |_______________*______________________________*__________________________________________________________________________________________________________________________*|
  • |__________________________*_________________________________________________________________________*____________________________________________________________________*|

5 inputs(s) for total of 1.335700000000 xmr

key image 00: 531dbac3035fa049df12045689785cd550476639bdfaa57171abd61f3d21f56a amount: 0.000700000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 668feeb18a5defa63d60df7eaaef486ea97d570777ef2de79e86f69031a6d92c 00057931 1 26/212 2014-05-26 22:10:28 09:346:21:29:40
- 01: 8f3d7e4defd4defc5fba5ccd2156ec9d363d01271380adad0415b33352602c01 00066978 1 15/9 2014-06-02 02:36:44 09:340:17:03:24
- 02: b3bfc9ec05afa22eb7a583dd239f6099bb4cccd72585e6eed08a7d58147fb724 01200575 3 3/15 2016-12-13 16:43:48 07:145:02:56:20
key image 01: 475f0ee7a742f7f79b662cda51f84799bda51d9e85adc40e43f378d4676e0a0a amount: 0.005000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b2ab66060020153d499477c5501bef8dc259614bb4adf20f46d478ed604fa718 00074714 1 1/34 2014-06-07 12:48:33 09:335:06:51:35
- 01: 49015cbbe0fb9cc5205b225b820aef55dbea559cf92520539d637e8f1a1886d4 00101413 1 14/53 2014-06-25 20:09:40 09:316:23:30:28
- 02: 03c75d82d9bb40ae666e995b81db5fe7f6c71e9cd0a4d36381a293b145ca007c 01200994 4 3/17 2016-12-14 07:42:06 07:144:11:58:02
key image 02: 86a9fcca6e42a5463c49984aae2a72777fa16e2a4d611634f858f187e4ee4725 amount: 0.030000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4b5c72125209e0fdb60046cefe2fb83152a58e46c82399e5c37f2189bcb1789f 00086800 1 5/34 2014-06-15 18:46:56 09:327:00:53:12
- 01: 0d17deedd60b04d7959c07c73f4c157f4149db59dbaeb19f155e347f0f2a2761 01118811 0 0/5 2016-08-22 04:53:57 07:258:14:46:11
- 02: 4c8804813324f260665e7257fa3480db660979b37a63ee4e60de1b9b692d63b1 01200692 3 6/12 2016-12-13 20:19:07 07:144:23:21:01
key image 03: 1f4231ecc471eef0d414f4513976247bf9b927b1386cb1053f1c64fab7efb32e amount: 0.400000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5e680b883e4eb441201a7861610196be441f75e827bb6d9082a947854f8f1d7f 00172402 4 35/84 2014-08-14 03:20:03 09:267:16:20:05
- 01: 7be52838af5cc2502ccc4ceb0bb87683e9177d02406c5f7e952d73e9778c5ed0 00416816 1 10/54 2015-02-01 05:34:38 09:096:14:05:30
- 02: d41f0377944e002fb39200961b41c58871fa240e82116b03d1921ed79f3e113a 01201313 3 3/11 2016-12-14 17:21:10 07:144:02:18:58
key image 04: c349cf1d986b9f70ee376c449d5842b54847c6d7b5b387a55f186b3b0149e064 amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b996b65790ad69b22e978ab91296ff87231c4c24b26973dd6857d848592fa58c 00261042 1 14/114 2014-10-14 23:46:02 09:205:19:54:06
- 01: 73640266e9885195d1c64b1ea3e44f3e842e29dcfabfd044466b27353f8d6126 00840599 1 5/7 2015-11-25 00:47:13 08:164:18:52:55
- 02: eaf9b1d69efca6f1d3228146f450ebee978d5fabd11710e1d4c0d8ffb719221d 01200902 3 7/13 2016-12-14 04:18:46 07:144:15:21:22
More details
source code | explorer version (api): master-2024-03-03-26331e6 (1.2)