xmrchain.net & Explore.Moneroworld.com & monerotools.i2p

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Mine on xmrpool.net to support the hosting of this block explorer and other services of MoneroWorld!

Check out the Open Node Directory

Go to the Testnet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly?

Autorefresh is OFF

Tx hash: cdc9e766f253615b4b867371ee0dceadd598a290e007fd9adca3ef64edc924a4

Tx prefix hash: 2475004deaedcfc6b652c7b5e304be6eb345db0b49128dbf26fd2faee2bf886b
Tx public key: 1b987cc28ce7368db1e7a38857500226a580e508d8e79710342f62071692a2d9
Payment id (encrypted): e62a29e6067db4d3
Timestamp: 1575343535 Timestamp [UCT]: 2019-12-03 03:25:35 Age [y:d:h:m:s]: 00:003:20:31:45
Block: 1980442 Fee (per_kB): 0.000024990000 (0.000014457492) Tx size: 1.7285 kB
Tx version: 2 No of confirmations: 2800 RingCT/type: yes/4
Extra: 011b987cc28ce7368db1e7a38857500226a580e508d8e79710342f62071692a2d9020901e62a29e6067db4d3

2 output(s) for total of ? xmr

stealth address amount amount idx
00: 670a2766093f0409792dcd077c15afc8598682ffe5cc516828cfba9f43f55b32 ? 13555075 of 13624047
01: 44067a231d884f53715fdc20b4c658b4fd355da07ba544ffcd4487b5836bb299 ? 13555076 of 13624047

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2019-11-22 21:52:25 till 2019-12-03 03:57:02; resolution: 0.06 days)

  • |_*__________________________________________________________________________________*_____________________________________________________*_*____________*______*_____****|

1 input(s) for total of ? xmr

key image 00: 4d06cf185d6f292846a74bcc7091d400291bf58fe1ac011d49655ca9148ab06e amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: dcf3d6bf9071885d1a3ea9560ee565b9bc268af47d1f0796d84802c10befb60d 01972815 11 1/2 2019-11-22 22:52:25 00:014:01:04:55
- 01: 2ba524372c6c20a556f0920ef8f32edc27812ffbcb5de570f393d5ffd19caf77 01976416 11 1/2 2019-11-27 23:31:14 00:009:00:26:06
- 02: a8f4b1cedc3edc6c11c6d4d4eb6a2df81c7f65d27e67275f186509ee84621585 01978958 11 2/16 2019-12-01 06:07:10 00:005:17:50:10
- 03: 6c78c7fc8642f01e5b3aa941533f9437b9c9f967cb7a3e44385068d6c13b6219 01979116 11 1/2 2019-12-01 09:37:45 00:005:14:19:35
- 04: bc163678878016676106e1904cd0a44d7a360d10070f641b817ab5e48b990aab 01979731 11 4/2 2019-12-02 04:23:59 00:004:19:33:21
- 05: b05b2bf78c5d2af2968e3934fec73293d7623359e7799ba4c94d9133e1e6a36c 01980021 0 0/1 2019-12-02 14:02:33 00:004:09:54:47
- 06: 17202c10e84dc7c34503502c1af09d951806da2d452fbc81d56ce98937b5678d 01980307 11 2/16 2019-12-02 23:15:39 00:004:00:41:41
- 07: 05b4e1efbf0e677369d4fd3f6baadd9bdc99964a07f06dc64d5910feb3f8d342 01980338 11 1/2 2019-12-03 00:23:34 00:003:23:33:46
- 08: 62464847f1e6ad9afc891b8024d6019f5d3c3dadba36520111fc2e3dc7b8a798 01980361 11 1/2 2019-12-03 00:55:48 00:003:23:01:32
- 09: 39e6815d693535dfee83e9e183b80c35c5c1a9fc9457dc15bfb24f9d608bc480 01980394 11 2/2 2019-12-03 01:57:31 00:003:21:59:49
- 10: 584ee025cc12396b768055c08a8225af4485c5f0d8df9574eb0104e8a0cb0b99 01980425 11 12/2 2019-12-03 02:57:02 00:003:21:00:18
More details
source code | explorer version (api): master-2019-11-26-df6e3bb (1.1) | monero version: 0.15.0.1-6def88ad4