xmrchain.net & Explore.Moneroworld.com & monerotools.i2p

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Mine on xmrpool.net to support the hosting of this block explorer and other services of MoneroWorld!

Check out the Open Node Directory

Go to the Testnet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly?

RANDOMX IS COMING

Tx hash: eff70efc57bc8b1a6414c2af509e22fdc02341478303ba8228ce7e0ce3f6ab60

Tx prefix hash: 8f3f9a28b240fd7daabbf87de4ad4bde8b1ab3630c74176f274b5e466f6c35d5
Tx public key: 584ae9e92ddfef37d24d6e36355aa85c1b2b8056fdde4f827787f449a178432a
Payment id (encrypted): cc5b71704ddc37df
Timestamp: 1573263491 Timestamp [UCT]: 2019-11-09 01:38:11 Age [y:d:h:m:s]: 00:009:09:39:20
Block: 1962859 Fee (per_kB): 0.000025920000 (0.000014953285) Tx size: 1.7334 kB
Tx version: 2 No of confirmations: 6744 RingCT/type: yes/4
Extra: 01584ae9e92ddfef37d24d6e36355aa85c1b2b8056fdde4f827787f449a178432a020901cc5b71704ddc37df

2 output(s) for total of ? xmr

stealth address amount amount idx
00: 2bfd42a970ca72dab250d85f5a4b3d0f3020f58d6e6deeed50f33cae6a627014 ? 13147983 of 13308775
01: 9cc79d152a4e8a312bfbc6835b7a9186d5bd9300ca22a811029427df0ae9efb0 ? 13147984 of 13308775

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-10-20 09:13:32 till 2019-11-08 19:40:10; resolution: 2.26 days)

  • |_*________________________________________________________________________________________________*____________________________________________________*_*_____________***|

1 input(s) for total of ? xmr

key image 00: 129d0e7047a93858900b5f7b258cd4bb2148c5494dabf9a6f0bd50d053cc20b7 amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ab09e875bdee6fac87dd9b97e38b7cadc09dc9f70256d449845a559ba21e1cbe 01686778 11 2/2 2018-10-20 10:13:32 01:029:01:03:59
- 01: 8cf3670efc87909d8a6c0bac9a353401a59bcf93101dc24d525de7378b50b933 01846062 11 2/2 2019-05-30 16:26:39 00:171:18:50:52
- 02: 24ee959a93729bab82e8d1fa105c44e67786e8c5b3b6b37dc8a292703645dbe5 01932022 11 2/2 2019-09-27 03:35:42 00:052:07:41:49
- 03: 5dd0c468098bbb8105990752e2088327c915c96c9f0e5a0e7a6e8f785e88b617 01936012 11 2/2 2019-10-02 18:13:20 00:046:17:04:11
- 04: 965db7f2c00dcea28e54e3e67b96c87d5d63244295568e07fe54f7390f75065e 01957819 0 0/1 2019-11-02 01:50:11 00:016:09:27:20
- 05: 0d5cef3f4c49dc3b12fefe192c4b212fc730dc376e0fa6483d66b8bb250578f8 01960108 11 1/2 2019-11-05 05:44:30 00:013:05:33:01
- 06: 4a5058204f1424fbeaf93d2ef1dc19797486d517a7528c0507326f655af55ed6 01961726 11 2/2 2019-11-07 12:03:44 00:010:23:13:47
- 07: f2f5fc2bb7d6f284ddce8f63bef53d6a9a6b7086002637f1c7f3472ef8631160 01961764 11 1/16 2019-11-07 13:12:11 00:010:22:05:20
- 08: 917477c9912b181f5e87a983cb925ea6f7cf89e734cfa01fdb03315404542210 01962105 11 1/2 2019-11-08 01:22:35 00:010:09:54:56
- 09: 5702c22d25749d143d620680c16813d18f0c6895c8e36eebe7e0874e132f38d8 01962557 11 1/11 2019-11-08 15:18:23 00:009:19:59:08
- 10: 758445cf04166ac560e747ae391d96a9bd81d1660f806ebadd23028ea08ee283 01962677 11 2/2 2019-11-08 18:40:10 00:009:16:37:21
More details
source code | explorer version (api): devel-2019-05-22-7fca3a5 (1.1) | monero version: 0.12.3.0-master-67a56a9