xmrchain.net & Explore.Moneroworld.com & monerotools.i2p

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Mine on xmrpool.net to support the hosting of this block explorer and other services of MoneroWorld!

Check out the Open Node Directory

Go to the Testnet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly?

RANDOMX IS COMING

Tx hash: d283fda44cac56008c4d7ec7cb2298b530ee38e10e3c7eceefcbdc3b5d28466a

Tx prefix hash: bf646951293b99dfacc056752ca7e921b12939d9c46302d4aaa1d91b9c8643ff
Tx public key: ebaffcaf0181496e2ed6bebef4f63df2111dc7aff0d6c22cedef24504af26b2c
Payment id (encrypted): 987e21e8607ed1f7
Timestamp: 1573262658 Timestamp [UCT]: 2019-11-09 01:24:18 Age [y:d:h:m:s]: 00:009:10:14:54
Block: 1962854 Fee (per_kB): 0.000025860000 (0.000014952366) Tx size: 1.7295 kB
Tx version: 2 No of confirmations: 6758 RingCT/type: yes/4
Extra: 01ebaffcaf0181496e2ed6bebef4f63df2111dc7aff0d6c22cedef24504af26b2c020901987e21e8607ed1f7

2 output(s) for total of ? xmr

stealth address amount amount idx
00: 25c55c4ddfbabc579e430993e52f9c60423fd8d5252fa16d76879e93a1df329e ? 13147922 of 13309113
01: 352c544ad088d86d950b65950090100c8bc36b8867cc8962ff44887f6deca2ac ? 13147923 of 13309113

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2019-08-10 18:04:00 till 2019-11-09 01:14:11; resolution: 0.53 days)

  • |_*________________________________________________________________________________________________________________________________*_______________________________*___**_*|

1 input(s) for total of ? xmr

key image 00: 0452e4bd12ad1935b6fa2c5fe24ae0eb622a9ed7d38809eafff7df404567a979 amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9561f0896fac65acdb0fc068bbfeab5323629825f3feb58188bf0582bd91040d 01897941 11 2/2 2019-08-10 19:04:00 00:099:16:35:12
- 01: af0b2a1945232135b3abf65206d44c7656ee3492b16801294482a8ce498a258f 01947575 11 2/2 2019-10-18 19:24:39 00:030:16:14:33
- 02: 3ff81b04c81644c4dd33805efee87d203516001a745ad7ef74c399e91a49ea55 01960010 11 2/2 2019-11-05 02:27:38 00:013:09:11:34
- 03: f417e262e55b5cdf698e61abdc18d86a4bfb5bf669eeb7d612aef91fe95b9d13 01961331 11 2/2 2019-11-06 22:48:13 00:011:12:50:59
- 04: af23a777536ec38c8a687f930c9b03ca5913c02760a0cdc4d72e4a426136e962 01961822 11 1/2 2019-11-07 15:01:41 00:010:20:37:31
- 05: 4e8a5569bf8192669e71b7955d1250339af77ceea262360de2735a0211ade0e1 01961994 11 2/2 2019-11-07 21:07:34 00:010:14:31:38
- 06: b1e5c9b55430e200c7106734f7f8dcfc8fa63db1eadd3f0aa0cc24d983b1e2f8 01962500 11 2/2 2019-11-08 13:03:36 00:009:22:35:36
- 07: ff1b018e9834703deaeff47dc726379a414e8bf9fff3c42ee56f24f449ee48cb 01962591 11 1/2 2019-11-08 16:10:29 00:009:19:28:43
- 08: 3d540b25bfd03d11de8cb8e0afc7c1826875dbcb5cc9be21debf75c32edd9833 01962634 11 2/16 2019-11-08 17:21:36 00:009:18:17:36
- 09: dcf243fda8844b69bcf27c5b61c4ec11103bf6bc3c2facf1bf53ec2fa7fd1b0d 01962641 11 2/2 2019-11-08 17:35:28 00:009:18:03:44
- 10: 497bffbaf0a861aab65ecb912626b23aa63577dcd1853a9d612d6ebb3e559cdc 01962827 11 1/2 2019-11-09 00:14:11 00:009:11:25:01
More details
source code | explorer version (api): devel-2019-05-22-7fca3a5 (1.1) | monero version: 0.12.3.0-master-67a56a9