xmrchain.net & Explore.Moneroworld.com & monerotools.i2p

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Mine on xmrpool.net to support the hosting of this block explorer and other services of MoneroWorld!

Check out the Open Node Directory

Go to the Testnet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly?

Autorefresh is OFF

Tx hash: fd983a77a40036b165183a5cace97795c971d763795a687bc845dbfaebf622f0

Tx prefix hash: ccdc0dbe82e0aa876678ec74140b062dda5bdb5163b21bc535bb87d10d930868
Tx public key: 01d3cd8741109b4d0fdd66469f83478073fcff271dacccaf862ce76c95ffe4ac
Payment id (encrypted): b1ba8c32ac8a35fd
Timestamp: 1562817223 Timestamp [UCT]: 2019-07-11 03:53:43 Age [y:d:h:m:s]: 00:149:13:39:44
Block: 1875918 Fee (per_kB): 0.000159220000 (0.000092113718) Tx size: 1.7285 kB
Tx version: 2 No of confirmations: 107905 RingCT/type: yes/4
Extra: 020901b1ba8c32ac8a35fd0101d3cd8741109b4d0fdd66469f83478073fcff271dacccaf862ce76c95ffe4ac

2 output(s) for total of ? xmr

stealth address amount amount idx
00: 15136c1c3700682a0c38bbd3ee3be549672fcb0e8bcff5ee0bad305a0e95554e ? 11300406 of 13635028
01: 95fb8e572b02d5f4f3f47f83c1cab73ec7b54f20428fe34523e5841c3eea340c ? 11300407 of 13635028

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2019-06-14 23:36:38 till 2019-07-11 04:28:45; resolution: 0.15 days)

  • |_*_________________________________________________________________________________________________________________________________*________________________*_*_______*_**|

1 input(s) for total of ? xmr

key image 00: 2ff2f05ae6977e4d59724caa744008e62024327b1f6c472c5cba2122e827c1c7 amount: ?
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c2b5b8f9273bb3ea6ac7db028ababa01b11f6df1a00502e7e9b96afeaf0e13ab 01857068 11 1/2 2019-06-15 00:36:38 00:175:16:56:49
- 01: bfc24e2aab11176a3b9e4462d37888802af27484610d4dd463054b7dfe5641f0 01871614 11 1/16 2019-07-05 05:10:17 00:155:12:23:10
- 02: 0456b41bbbc7a6b57b87435fd4e325548198f7abdcef57be7f26888245592240 01874354 11 1/2 2019-07-09 00:49:44 00:151:16:43:43
- 03: 3ed960aba0431ea94d6ef42ce232dbd0c44cdae18a8518cd6430fbf4b35aa559 01874431 11 2/2 2019-07-09 03:27:05 00:151:14:06:22
- 04: 603a9c8b370cc90b6bfd883e9873eac3a4af8ad44954029e6af18d49ec8c36a4 01874668 11 1/11 2019-07-09 10:43:22 00:151:06:50:05
- 05: fdabe22efd768f037e721a29a580910a8da1e513a71d235d67eb98a1da6467c7 01875482 11 8/3 2019-07-10 13:47:20 00:150:03:46:07
- 06: e7e466bffde083a98a9c7633ddb8c3a560818ee39d80ded12212049cdd31aa27 01875726 11 9/2 2019-07-10 21:34:22 00:149:19:59:05
- 07: b27cc4a29e252fff8e94aadb39784153b6943ab6373821ce607488619c4bf60f 01875833 11 1/2 2019-07-11 01:24:50 00:149:16:08:37
- 08: 3694e8aefb5532dd6898e893d0189add7cab4b61d087ffc758f347cbfd27a4de 01875874 11 2/2 2019-07-11 02:39:02 00:149:14:54:25
- 09: a0685e278d92f06c637c688278430e8cf4157816fe300140dce62c26902d7c88 01875880 11 2/2 2019-07-11 02:50:26 00:149:14:43:01
- 10: 8545c6f48a044adf041c5925f2f28788f81b7a1aef7e5947625127b846bc4031 01875903 11 2/2 2019-07-11 03:28:45 00:149:14:04:42
More details
source code | explorer version (api): master-2019-11-26-df6e3bb (1.1) | monero version: 0.15.0.1-6def88ad4