Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: 20319e2cf3dab314640ff3b55e1bdb0740b621d96bdd7a9e2398ec46b1b29778

Tx prefix hash: 44f3146801a5d2aa9cce88a48f7df9ede47b9cd937cddcb365dd866fb238bae4
Tx public key: 22c1daba68ceebf5a51af54cd1f7b04370eb0edfbb80d8885d88dc2b4e27b649
Timestamp: 1441156022 Timestamp [UTC]: 2015-09-02 01:07:02 Age [y:d:h:m:s]: 09:070:06:56:07
Block: 721144 Fee (per_kB): 0.050000000000 (0.177162629758) Tx size: 0.2822 kB
Tx version: 1 No of confirmations: 2555614 RingCT/type: no
Extra: 0122c1daba68ceebf5a51af54cd1f7b04370eb0edfbb80d8885d88dc2b4e27b649

1 output(s) for total of 0.010000000000 xmr

stealth address amount amount idx tag
00: 17eddfe34903e3cbe339653f4e82b020ceee33e440862c04787e6e8d97060ba2 0.010000000000 395122 of 502466 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-09-01 23:20:27 till 2015-09-02 01:58:55; resolution: 0.00 days)

  • |__________________________________________________________________________________________________________*_______________________________________________________________|
  • |________________________________________________________________*_________________________________________________________________________________________________________|

2 inputs(s) for total of 0.060000000000 xmr

key image 00: 2b3c640b00e0e9f39c17a03358e692ede970be981b70065c1f94ea7a4d99e44d amount: 0.040000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 22cbb6150722bfb33afc2b13d8bb903b99737af01db7f07cfb17a4dbf14c6649 00721134 1 1/3 2015-09-02 00:58:55 09:070:07:04:14
key image 01: 87a349ff8611a0069b8419dc29bf4defb7f15a12b80d139b34205086190a8af7 amount: 0.020000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5b66a6d875156224f717f038774e838b401ed2dd3f98ce65ea5049074394e12a 00721112 1 2/2 2015-09-02 00:20:27 09:070:07:42:42
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 40000000000, "key_offsets": [ 189284 ], "k_image": "2b3c640b00e0e9f39c17a03358e692ede970be981b70065c1f94ea7a4d99e44d" } }, { "key": { "amount": 20000000000, "key_offsets": [ 273434 ], "k_image": "87a349ff8611a0069b8419dc29bf4defb7f15a12b80d139b34205086190a8af7" } } ], "vout": [ { "amount": 10000000000, "target": { "key": "17eddfe34903e3cbe339653f4e82b020ceee33e440862c04787e6e8d97060ba2" } } ], "extra": [ 1, 34, 193, 218, 186, 104, 206, 235, 245, 165, 26, 245, 76, 209, 247, 176, 67, 112, 235, 14, 223, 187, 128, 216, 136, 93, 136, 220, 43, 78, 39, 182, 73 ], "signatures": [ "eeb634dc93879c35080ff2902ed7009c474cd96b4805b27b89090c54037083006ab140e21e4d252b665d2dacb198f03b4110a06b380483825357d55f120c4007", "6089169b4e004a63681749b6c04b07217c91453a92f6430b0f0d997769768c010877cd9079c4b3e1da8425e2aaa64d589cfe08200008034d02567aacc645c309"] }


Less details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-e06129bb4