xmrchain.net & Explore.Moneroworld.com & monerotools.i2p

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Mine on xmrpool.net to support the hosting of this block explorer and other services of MoneroWorld!

Check out the Open Node Directory

Go to the Testnet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly?

RANDOMX IS COMING

Tx hash: db3f869af1cdd23c2239f23b72be9c7ec99da5abb4164e4e8313cfba8429ad7a

Tx prefix hash: b27b1a9664e0109e2c8ee0f939b80cfa564f049d408b8ec930517daa93ffd844
Tx public key: 31f2d78b4f7b48d8280a11477b51fa62aa6739990df76b937133d552642799e6
Payment id (encrypted): 2405e05fd1799bae
Timestamp: 1562692463 Timestamp [UCT]: 2019-07-09 17:14:23 Age [y:d:h:m:s]: 00:128:22:49:36
Block: 1874899 Fee (per_kB): 0.000030650000 (0.000017682028) Tx size: 1.7334 kB
Tx version: 2 No of confirmations: 92672 RingCT/type: yes/4
Extra: 0209012405e05fd1799bae0131f2d78b4f7b48d8280a11477b51fa62aa6739990df76b937133d552642799e6

2 output(s) for total of ? xmr

stealth address amount amount idx
00: c4811ed762c37f3c3f948f9f5bd5608a457cf2dc67840834bd1ae8af0842b599 ? 11278455 of 13268889
01: d91f006b4eaf666b4daf9324087cc2602792bc703043f47bd0c1775e474b9af4 ? 11278456 of 13268889

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2019-05-18 19:43:51 till 2019-07-09 18:08:58; resolution: 0.31 days)

  • |_*__________*________*_____________*____________________________________________________________________________________*__________*_*__________________*______________*_*|

1 input(s) for total of ? xmr

key image 00: 37629723109a6e4c5b6ce1c2cc143c7feb5a764c513eba5c9af81da900ffdac3 amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c8de4decec787cb7a2e2ad0e9698bf738bdfd3f3de1f2e39cc0dfb84bda1c9c4 01837578 11 1/2 2019-05-18 20:43:51 00:180:19:20:08
- 01: 8169ace794405b6420cd93b64284a4e6e23a04ef1fda8068ab99dd86469c14be 01840095 11 45/2 2019-05-22 10:38:30 00:177:05:25:29
- 02: b23517f6690bb2751daf8b89fb3016e9665a6dc055be5d4f10eaa5c5436702b7 01841942 11 1/2 2019-05-24 23:21:21 00:174:16:42:38
- 03: f0cd2b9bb1ab3148a20d2c98ae5dab1b7ee2900125ecd5fb9442cd313ee3637a 01845225 11 2/2 2019-05-29 11:55:55 00:170:04:08:04
- 04: 3fcde7bbe1599d1ffacc8c254ff6bfeb9550305b423da92ff433ac610dcba9dc 01863980 11 2/2 2019-06-24 14:07:16 00:144:01:56:43
- 05: a1fa432d7cb145b6138b86d56a3798a1098f90343c41d563f5c8b1e9ace0faf1 01866247 11 20/2 2019-06-27 19:23:22 00:140:20:40:37
- 06: 2e9008f7675d1b2d0d8b81f8655805adad07a2d18901b300e81da1b1938c0295 01866723 11 1/2 2019-06-28 09:59:10 00:140:06:04:49
- 07: f0c8ea9c541f6a2f4770881374f6140718268f1931861d47a86cf774f9a1abf5 01871029 11 1/4 2019-07-04 09:23:43 00:134:06:40:16
- 08: bce9494a208d3c12d55d0b9985eff7054992dbdfb7ba43cb417d497d66fe1c91 01874412 11 2/16 2019-07-09 02:30:34 00:129:13:33:25
- 09: 1d13a3ba1f4630582a91a6f11a680fb75c9b2d847fe1702be1e733c6cf7bb6c4 01874877 11 2/2 2019-07-09 16:47:21 00:128:23:16:38
- 10: 17e9be91ad6bf13cf6f0eea4f1c42b8fe67a52de194281dbe7e6cb342f37330c 01874896 11 1/2 2019-07-09 17:08:58 00:128:22:55:01
More details
source code | explorer version (api): devel-2019-05-22-7fca3a5 (1.1) | monero version: 0.12.3.0-master-67a56a9