Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: 29e42f2ced83d860b77b3da0728313a129aa568f19c7e0ef1839bed341bfb0d2

Tx prefix hash: a28b6bdb557f0dc3eb31e4f0a95e2e8b2c737f3101c3b81c3272d870131a0a1f
Tx public key: 2d605326ce124a4237aa46b2264fff680adec1a9212d201ca795573a8881afb5
Timestamp: 1406368324 Timestamp [UTC]: 2014-07-26 09:52:04 Age [y:d:h:m:s]: 10:049:02:01:43
Block: 145518 Fee (per_kB): 0.008838270000 (0.014910030445) Tx size: 0.5928 kB
Tx version: 1 No of confirmations: 3088868 RingCT/type: no
Extra: 012d605326ce124a4237aa46b2264fff680adec1a9212d201ca795573a8881afb5

1 output(s) for total of 0.500000000000 xmr

stealth address amount amount idx tag
00: 415cd4501cf237c4b812407b8e1945c1ebdf1f4529a50c5346d8ea6a61e891e5 0.500000000000 164193 of 1118624 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-19 11:37:52 till 2014-07-26 08:49:53; resolution: 0.04 days)

  • |__*_______________________________________________________________________________________________________________________________________________________________________|
  • |________________________________________________________________________________________________________________________________________________________________________*_|
  • |_____________________________________________________________________________*____________________________________________________________________________________________|
  • |________________________________________________________________________________________________________________________________________________________________________*_|
  • |________________________________________________________________________________________________________________________________________________________________________*_|

5 inputs(s) for total of 0.508838270000 xmr

key image 00: f1fe061e573db5fd142f64ec68a66fef647cc785c926750b36375cc9bdfd125a amount: 0.002838270000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c069dbb8e472e673d7931c43139bd3c685c89fcfd2321ee19d71463840c23114 00135598 2 5/68 2014-07-19 12:37:52 10:055:23:15:55
key image 01: c4d60fcc9e0b3c878c9652bb0346ec2c30923e10c4e882d9ecf57dca9b4ab038 amount: 0.006000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d25f6d47a1a9dd424f9b4e11e5f8f3c29366d6b27f4fccde6528ce42cbcce763 00145382 1 11/4 2014-07-26 07:49:53 10:049:04:03:54
key image 02: 15becdd487db18f4ceddcfeb03604dc1b9945d2b81acca1aa86bbc0c5b812720 amount: 0.010000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: dce4728330aec92f52f88b0eb193c3d0cce06010836139492657dcdcb84ddfa8 00140110 1 11/4 2014-07-22 14:51:48 10:052:21:01:59
key image 03: 724b72cbf2787c88e1840e662eae0904985a15726ae93468dca6773c8a48ed91 amount: 0.400000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 15f3c421d68214fba8245bd9712e86d2b61a76c08927365ff971cc4bd15e1cdb 00145382 1 11/4 2014-07-26 07:49:53 10:049:04:03:54
key image 04: 0dd4a98bf7702351c330f921b8d233889bac01a58902394a21bfd1ad057d6efa amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 15211ad1a5e97f5207a273ec28e50f8ee53ea16b1fc728d52f4f99defbf8f272 00145382 1 11/4 2014-07-26 07:49:53 10:049:04:03:54
More details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-e06129bb4