Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: 08872c12cddc72d4f81191e632de69229fce5a1bed9d0329e0503147f6aa93bb

Tx prefix hash: 2f09c06ab140d5fb40263969ce821eaa8323701b366acb96bd21d292ee9eec87
Tx public key: 7874fd100649bf87556d3b055f7a4a85c7fc2110adf193d65dc4b036bf908211
Timestamp: 1419286372 Timestamp [UTC]: 2014-12-22 22:12:52 Age [y:d:h:m:s]: 09:273:21:28:00
Block: 359376 Fee (per_kB): 0.100000000000 (0.351890034364) Tx size: 0.2842 kB
Tx version: 1 No of confirmations: 2881750 RingCT/type: no
Extra: 017874fd100649bf87556d3b055f7a4a85c7fc2110adf193d65dc4b036bf908211

1 output(s) for total of 0.600000000000 xmr

stealth address amount amount idx tag
00: 8b98cf76f5de70fa589d067f72752cbe034768a3522cd4559c3b3ffce4e1eb41 0.600000000000 321652 of 650760 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-12-22 08:53:49 till 2014-12-22 11:49:12; resolution: 0.00 days)

  • |________________________________________________________________________________________________________________*_________________________________________________________|
  • |__________________________________________________________*_______________________________________________________________________________________________________________|

2 inputs(s) for total of 0.700000000000 xmr

key image 00: 9bdf261f36c327f6a12790df699bee2c1b82ed145f402625af96cf2564ae0e88 amount: 0.300000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d39f574a4dd1fdcff248863c986adeb4ebf4cfbcad03eab072dc65411eef6f20 00358635 1 7/59 2014-12-22 10:49:12 09:274:08:51:40
key image 01: ac960901e8d6533b09e95ce6c32e1d859d913fa4f1cbfe60d90b2eebbf504f96 amount: 0.400000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: db2237be54e85fa13d14bd8ff513277052779d23776a42ad469dd3949d723a2c 00358572 1 11/51 2014-12-22 09:53:49 09:274:09:47:03
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 300000000000, "key_offsets": [ 385989 ], "k_image": "9bdf261f36c327f6a12790df699bee2c1b82ed145f402625af96cf2564ae0e88" } }, { "key": { "amount": 400000000000, "key_offsets": [ 308430 ], "k_image": "ac960901e8d6533b09e95ce6c32e1d859d913fa4f1cbfe60d90b2eebbf504f96" } } ], "vout": [ { "amount": 600000000000, "target": { "key": "8b98cf76f5de70fa589d067f72752cbe034768a3522cd4559c3b3ffce4e1eb41" } } ], "extra": [ 1, 120, 116, 253, 16, 6, 73, 191, 135, 85, 109, 59, 5, 95, 122, 74, 133, 199, 252, 33, 16, 173, 241, 147, 214, 93, 196, 176, 54, 191, 144, 130, 17 ], "signatures": [ "b36bc32e227208143131b57c3ec76dbb41dde22990c387ac07facb79575d1f01ef0e101009765f4e022798c32869071d8bb1328085cec3ad84f128652cfd4808", "cb042d82dc3b56b3c08c83e499788272115d0022407826ecdad396f4084c9807d3baed9f76c4f9875b1fe4d2addab431b36d1fd1e15725ab6809b1850452ae07"] }


Less details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-e06129bb4