Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: 26ddae18bea06f2f1a6c2c5c8c6da9c32f95402aecee707f25f8ea8954e34d5c

Tx prefix hash: 340c5ee5afad126a71a9cab84e77f1b8efa3145d6a697c957042f509685884fc
Tx public key: fdb424dcf3228c28bbd47db05aa57aa1cc741f2df94d6b15ffef016c67eba70a
Timestamp: 1421747441 Timestamp [UTC]: 2015-01-20 09:50:41 Age [y:d:h:m:s]: 09:295:19:25:52
Block: 399959 Fee (per_kB): 0.100000000000 (0.351890034364) Tx size: 0.2842 kB
Tx version: 1 No of confirmations: 2877394 RingCT/type: no
Extra: 01fdb424dcf3228c28bbd47db05aa57aa1cc741f2df94d6b15ffef016c67eba70a

1 output(s) for total of 0.300000000000 xmr

stealth address amount amount idx tag
00: 3a569ba17302e187f44660b0443874bdc0c6589da233816c4658c561b0806ca0 0.300000000000 425581 of 976536 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-01-19 08:56:14 till 2015-01-20 07:30:01; resolution: 0.01 days)

  • |__________________________________________________________________________________________________________________________________________________________________*_______|
  • |________*_________________________________________________________________________________________________________________________________________________________________|

2 inputs(s) for total of 0.400000000000 xmr

key image 00: a0f51249e0973796002b5d9eff6e1025d384f835874a99598cc61bac2cd77909 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b38ee62a7aab998f643cc77713f8d921d69b8fa92109a9d4acfbe5e6cce2d56d 00399716 1 3/51 2015-01-20 06:30:01 09:295:22:46:32
key image 01: 2d01b41c9db9bdebf2d222b81c0ff0af10a469a9870980434795ce516ec4c92c amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d8a036eac89b067433fec4cfc46207d2dbada95a2e67f5aad51a818de1e8b792 00398520 1 6/53 2015-01-19 09:56:14 09:296:19:20:19
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 200000000000, "key_offsets": [ 745543 ], "k_image": "a0f51249e0973796002b5d9eff6e1025d384f835874a99598cc61bac2cd77909" } }, { "key": { "amount": 200000000000, "key_offsets": [ 743986 ], "k_image": "2d01b41c9db9bdebf2d222b81c0ff0af10a469a9870980434795ce516ec4c92c" } } ], "vout": [ { "amount": 300000000000, "target": { "key": "3a569ba17302e187f44660b0443874bdc0c6589da233816c4658c561b0806ca0" } } ], "extra": [ 1, 253, 180, 36, 220, 243, 34, 140, 40, 187, 212, 125, 176, 90, 165, 122, 161, 204, 116, 31, 45, 249, 77, 107, 21, 255, 239, 1, 108, 103, 235, 167, 10 ], "signatures": [ "e77758e0b60dc64ba9aedf09401f60d85a634b1746b7f41ca65282174062e10ce58ce0accd759d49d1c96ed49bcd29324655358ad988038df02ab8a42b1e730f", "e91e7fd89d261938d9a0c07c6141ca759e08ae507ca1769774fc07b75306fa0734eefd6eb9ed5ed77834aecbc2625dc27a30b9b96c1194f17b5f4edb69f12602"] }


Less details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-e06129bb4