xmrchain.net & Explore.Moneroworld.com & monerotools.i2p

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Mine on xmrpool.net to support the hosting of this block explorer and other services of MoneroWorld!

Check out the Open Node Directory

i2p mining route available at: vkohxr7ealm23uacawcjpbxi3smas2wajr5ne6sgmmw42ygvjikq.b32.i2p

Go to the Testnet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Tx hash: dc85f2698d1779d353b2114ab12f5b255171032e0ea462ab5e80757094c4ef05

Tx prefix hash: fc578b05ce01850d67d89c780f9beafd8aa9d0747d02e35a020e40b6cf3a55ae
Tx public key: 7feb8d9a66b8917c812a76bdc9f8518538713d8f22172443ce02df882011278d
Payment id (encrypted): 372d27bbdeff0174
Timestamp: 1560371034 Timestamp [UCT]: 2019-06-12 20:23:54 Age [y:d:h:m:s]: 00:006:10:55:13
Block: 1855514 Fee (per_kB): 0.000031750000 (0.000018347630) Tx size: 1.7305 kB
Tx version: 2 No of confirmations: 4646 RingCT/type: yes/4
Extra: 020901372d27bbdeff0174017feb8d9a66b8917c812a76bdc9f8518538713d8f22172443ce02df882011278d

2 output(s) for total of ? xmr

stealth address amount amount idx
00: 007f8e9a8711e9b850b23834503e33d93612e706e645870579ed9038eae7aa78 ? 10744403 of 10888157
01: 1ffe5f1c9636e78e5eb9be9b0b93101defa866dadeaf213b7c225efff5a10ab5 ? 10744404 of 10888157

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-10-25 13:45:09 till 2019-06-12 19:48:41; resolution: 1.35 days)

  • |_*_______________________________________________________________________________________________________________________________________________________________*_____***|

1 input(s) for total of ? xmr

key image 00: 860a9b465b2a334c7c8a107d4f098a691611d825defbd5bd41e51f166cc5135a amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0e1848b39aa340f7893fafd5690e3cf5be798d79b686b08c864b58f518acf4ee 01690552 11 2/2 2018-10-25 14:45:09 00:236:16:33:58
- 01: 933aa6155ea23e8f606a4a6fe1d9380a9ec521e4a34b130b9ac6d04437460a75 01846866 11 1/2 2019-05-31 19:15:05 00:018:12:04:02
- 02: 14db7bd10067f1da12d9cc5bf1c20059a8b431102a00c16e43b55de8e36180e9 01852877 11 1/2 2019-06-09 04:41:25 00:010:02:37:42
- 03: 77f2b1b202cf5d3433a6f2293a95bf61d0677651875aeac794c06bc2e6b09b54 01853325 11 8/4 2019-06-09 20:04:22 00:009:11:14:45
- 04: 52de9c0e7a72de6bd9f17a07e58c89603fde574abb32db9e1d5d2c7e86a87d6f 01854317 11 2/2 2019-06-11 04:33:21 00:008:02:45:46
- 05: 9c61b1eb2b9dc0f9b539ce2bee62fbdc077ec6682c8caed601b59192696324ec 01854365 11 1/2 2019-06-11 05:58:56 00:008:01:20:11
- 06: 4aee68ee2f95ae2dd5e3f0391a306e6b400e3ef055d0b7e935a59aa4d17ba17c 01854754 11 2/2 2019-06-11 18:28:36 00:007:12:50:31
- 07: 0575ff9413cfe565ef4ade0234cb393abcecaf401ea096bb5694de06e6db4b07 01855264 11 1/2 2019-06-12 11:30:51 00:006:19:48:16
- 08: e43ced116578501cf93a95a1f39ff80b2985cd549dafce63e43e57ebddcadc0c 01855338 11 1/2 2019-06-12 13:54:31 00:006:17:24:36
- 09: c2b19cc674f83e89a5e3bb738b9f2fe897fb74e8e08f376491592f74693a8824 01855439 11 2/2 2019-06-12 17:17:52 00:006:14:01:15
- 10: e9baaed4db204a50a72fe0074fb325c9bc127e6bcb142f7bfbd38fa7a1bbb43a 01855472 11 1/2 2019-06-12 18:48:41 00:006:12:30:26
More details
source code | explorer version (api): devel-2019-05-22-7fca3a5 (1.1) | monero version: 0.12.3.0-master-67a56a9