Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: 0870feb06efa2b61ca56f774342a557805479c42b54bfcaea42e0ebbb8c55460

Tx prefix hash: 246c0dde0177e93beaa4e9719e13abfe7a7368fe7d37f54f3a98cc29a8ecc57a
Tx public key: abd7f6e23e5f0cc9b1c00b5eb17e2ecfef35c6d4f06b56f80930458d38d13a41
Timestamp: 1425464990 Timestamp [UTC]: 2015-03-04 10:29:50 Age [y:d:h:m:s]: 09:202:08:51:15
Block: 461560 Fee (per_kB): 0.100000000000 (0.351890034364) Tx size: 0.2842 kB
Tx version: 1 No of confirmations: 2779558 RingCT/type: no
Extra: 01abd7f6e23e5f0cc9b1c00b5eb17e2ecfef35c6d4f06b56f80930458d38d13a41

1 output(s) for total of 0.300000000000 xmr

stealth address amount amount idx tag
00: 94b675893da7c24088c0023114d327ac55df64b38ec8e88bb9042de676746a39 0.300000000000 471298 of 976536 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-03-03 11:11:42 till 2015-03-03 18:30:24; resolution: 0.00 days)

  • |________________________*_________________________________________________________________________________________________________________________________________________|
  • |__________________________________________________________________________________________________________________________________________________*_______________________|

2 inputs(s) for total of 0.400000000000 xmr

key image 00: ef9383ec038092c27cab5378c909832723d1215787f5010b7d810b918088d675 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 309631c9ba91a904501bd9d74c6dbf3b6ca5263568a242ff594d5f579a850585 00460254 1 24/61 2015-03-03 12:11:42 09:203:07:09:23
key image 01: d54f2df5943e99ccf4eeb686871c83f893aec22e02f745b1afff63a7a0a8f83b amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: edb25b23cc28ef74587f7b23eb76c7d63d123bf5ee53eae586fd0fc045ee3eaf 00460589 1 27/49 2015-03-03 17:30:24 09:203:01:50:41
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 200000000000, "key_offsets": [ 806914 ], "k_image": "ef9383ec038092c27cab5378c909832723d1215787f5010b7d810b918088d675" } }, { "key": { "amount": 200000000000, "key_offsets": [ 807333 ], "k_image": "d54f2df5943e99ccf4eeb686871c83f893aec22e02f745b1afff63a7a0a8f83b" } } ], "vout": [ { "amount": 300000000000, "target": { "key": "94b675893da7c24088c0023114d327ac55df64b38ec8e88bb9042de676746a39" } } ], "extra": [ 1, 171, 215, 246, 226, 62, 95, 12, 201, 177, 192, 11, 94, 177, 126, 46, 207, 239, 53, 198, 212, 240, 107, 86, 248, 9, 48, 69, 141, 56, 209, 58, 65 ], "signatures": [ "091cd86267f316a98a1d0dd7c90cf8507fedd9caf9e506e3e4f24bc233766f0ade31e2db4a0af694d4b5eb716cfeaaf5c9c1ae079f48ff215b70ed3a3ed33a03", "07781bf03272f068c8cc01d900d2916f3e259231e2bacdaa0b4d0bad0a115701b25d55f45628d8c72c8324e3309100f18d0d962aeeec0374bcbd67c358e24a02"] }


Less details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-e06129bb4