xmrchain.net & Explore.Moneroworld.com

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Solo mine on your own blockchain to support the monero network!

Public Node Directory || Monero Block Frequency Tool || Monero Website || Make Monero Better!

Monero Testnet Explorer || Monero Stagenet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly? Monero FAQ

Moneroblocks Explorer || Monerohash explorer || Map of Monero Network

For a pretty version of this explorer with javascript || A note on/for services

NOTE: This explorer actively tests beta software in production. If it crashes, hooray! We found a bug! Please find a backup explorer for these instances.

The most up to date software for Monero are version: CLI v0.18.3.3, GUI v0.18.3.3

If you need to use a remote node, you should set up your own. Good guide for setting up a remote node.

High Fee Bug. Remote nodes can increase your tx fees. Double check before sending. Run your own node.

Autorefresh is OFF

Tx hash: dfff612a50231d9fbf1c4b331bf986fb61a6ea954f988a8eddc795a4b719c4a2

Tx prefix hash: cc2b2ee75c94375d94b1ec025522e1145d73c40638defe94ff2e154fd0378b1c
Tx public key: 02a7dc4dc6a27d8823e145dc216a4a81dbb90dcb8ca5fffd3b9ce06309d51401
Timestamp: 1417902920 Timestamp [UTC]: 2014-12-06 21:55:20 Age [y:d:h:m:s]: 09:157:09:32:44
Block: 336619 Fee (per_kB): 0.100000000000 (0.078648233487) Tx size: 1.2715 kB
Tx version: 1 No of confirmations: 2809101 RingCT/type: no
Extra: 0102a7dc4dc6a27d8823e145dc216a4a81dbb90dcb8ca5fffd3b9ce06309d51401

19 output(s) for total of 12.600000000000 xmr

stealth address amount amount idx tag
00: c65a977c28d7c9e8a0fe6269823ccba89f12b2da32503984ea4a3b6b8188ba6b 0.300000000000 365533 of 976535 -
01: b50ff57df00d56d691917dac77995037bb1757098faceee00f3d0d892580e74f 0.300000000000 365534 of 976535 -
02: 5f5b49b4f0fc1c00abf3c029246a654b13f58aad542fe7851d1fd25665cc8007 0.300000000000 365535 of 976535 -
03: 855a63677f1244a2a9b3453df55fbb1e261106dbf079f5461688fa5d63dd4c43 0.300000000000 365536 of 976535 -
04: 8966313f143db06de6055aeff8ca764f5c59b2781ddff25283ad13bdda3cbd76 0.300000000000 365537 of 976535 -
05: 5f23cc89196a36fa15eaf82b0055ff34e2d502fcc830ee5a966cabba74d06e6c 0.300000000000 365538 of 976535 -
06: cdbde52373b3e663399819ed6abecb3da6c618bac89e36991d45c1826477548d 0.300000000000 365539 of 976535 -
07: df199df78c237fbc1694596d281f946e4790642ad287582a94b91cfe2e58f3fb 0.300000000000 365540 of 976535 -
08: 79a4a0441a58da31b39245afacb7e78ea9521545bb611a294cd84e252b0ed396 0.400000000000 296005 of 688584 -
09: 21e633cd2b11f9daee3b1b3241513ecaf7532dc666a8e9d615302dfc270da987 0.400000000000 296006 of 688584 -
10: 41ad7fe266320d0d1a4bbb6f56f06275fc3f93273fbc2252c2ca308e05915fbe 0.500000000000 504635 of 1118624 -
11: e23fc059c83385dc636cad498c1febb9b6afd1581f75b11cd7a855e66e4c98bd 0.600000000000 299236 of 650759 -
12: e52dbdc60188a38f70914c11d4be7fc407236c55713dbbb7bd6cd638f6b93c4f 0.600000000000 299237 of 650759 -
13: 3c1a6ee35da8574845c764f8d92acc8835196c3bf653a0cc0467f0c04c37e034 0.700000000000 216927 of 514466 -
14: 20283fa530540b63b8543229ba5f35affae84dd49ee12e33b0f9b28346f96d4d 1.000000000000 359104 of 874627 -
15: 664d9bc437e26c5c90280109f578a02a475713af4cb01ea8cf9def8c2ed346b8 1.000000000000 359105 of 874627 -
16: ed4997497f5b1e96b0a501c2d6d143ec040d95f3eff10ee01ccd510da4e4672f 1.000000000000 359106 of 874627 -
17: 00f0e08b9fb7c03706f6d88aa2951e6e0cf6835be20cfcd77abfd330c7bfee4f 1.000000000000 359107 of 874627 -
18: 2ef67cf2e16682f3b72551f325743f0ef6b95f5d2c4cf081f435743a3493684e 3.000000000000 160011 of 300495 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-31 11:46:04 till 2014-12-06 13:15:15; resolution: 1.11 days)

  • |_____________________________________*___________________________________________________________________________________________________________________________________*|
  • |_______________________________________________________________________________________________*_________________________________________________________________________*|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|

3 inputs(s) for total of 12.700000000000 xmr

key image 00: bb9a5bdf2b8eb80d39caf09b919f8a23ab5d0f5a1afab0a5766937c5d69c17ef amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 43a16152af1e2f8e9afbe307454218bae6e6a7755fe950f35c88035382372080 00124171 1 51/72 2014-07-11 15:19:56 09:305:16:08:08
- 01: 67c4ff7c6e45e2b24dd701a7f58f69a3be8a9a4374539203d04cf2595596c3ba 00335646 0 0/4 2014-12-06 06:03:56 09:158:01:24:08
key image 01: b5fbbe83c20557e5d90ef42096b0dee6e3d7fc8545a8348b5325ef0de778f3df amount: 0.700000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 58b424f12850f4f247b28384da3e2c0b49e093319bad3ef91b6eba2c00fd2bb0 00216868 1 41/226 2014-09-14 02:24:06 09:241:05:03:58
- 01: e610d078e89bf6cca9b41d785d238f40c0a23d43852ce6c754d2a2c3b6943051 00336086 0 0/4 2014-12-06 12:15:15 09:157:19:12:49
key image 02: 3d83344b590031f92ae82c3a6d1e734a57a7713c26eb601be7bdfa12b565c531 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e239029100eee7dbdb8c149de3e3e49c103b8a3b96ea77bf32502f7736b6fa5d 00064613 0 0/5 2014-05-31 12:46:04 09:346:18:42:00
- 01: 96318548bcb4c079a041f61c7fb34fe24e02d9a76946563d7adab57fc94e09dd 00334470 0 0/4 2014-12-05 10:37:35 09:158:20:50:29
More details
source code | explorer version (api): master-2024-03-03-26331e6 (1.2)