Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: 397ee22af125e4dc10583bed7a5559890bed27bcd8cceafcfd2d39cbc35650f1

Tx prefix hash: 2bc0de3d8605eb1b35728a36291b4acd95639d2b359643f5d9205ea6e21a6d66
Tx public key: bc522e49880d667a843d61e0f573c5b3da4cc4daea881e8a338ddcb228c87672
Timestamp: 1423838278 Timestamp [UTC]: 2015-02-13 14:37:58 Age [y:d:h:m:s]: 09:268:21:07:51
Block: 434625 Fee (per_kB): 0.100000000000 (0.351890034364) Tx size: 0.2842 kB
Tx version: 1 No of confirmations: 2840804 RingCT/type: no
Extra: 01bc522e49880d667a843d61e0f573c5b3da4cc4daea881e8a338ddcb228c87672

1 output(s) for total of 0.300000000000 xmr

stealth address amount amount idx tag
00: 47326f8cc541840973c72f3cee62d53873f10303e919898f065b641375f0ef0c 0.300000000000 450428 of 976536 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-02-11 22:18:20 till 2015-02-13 04:24:28; resolution: 0.01 days)

  • |______*___________________________________________________________________________________________________________________________________________________________________|
  • |____________________________________________________________________________________________________________________________________________________________________*_____|

2 inputs(s) for total of 0.400000000000 xmr

key image 00: d54cf2a953f4e9ddffdf1eb869c55f7e1e2c5f66b36ed2874f1e4a84de08d60e amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 2e7071343a6ef5a2742fbe3d119b76cba1e61da9c46115ae08e010e5b640135b 00432253 1 11/55 2015-02-11 23:18:20 09:270:12:27:29
key image 01: 44a8ace0a5f3e1599d5f6c2267605ecef7607093ab34e508a290e8077018cfa5 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 22b2163c9de70fd3736824c361d9b6901127c3e62424a089175298d85afaf397 00433897 1 3/51 2015-02-13 03:24:28 09:269:08:21:21
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 200000000000, "key_offsets": [ 778633 ], "k_image": "d54cf2a953f4e9ddffdf1eb869c55f7e1e2c5f66b36ed2874f1e4a84de08d60e" } }, { "key": { "amount": 200000000000, "key_offsets": [ 780318 ], "k_image": "44a8ace0a5f3e1599d5f6c2267605ecef7607093ab34e508a290e8077018cfa5" } } ], "vout": [ { "amount": 300000000000, "target": { "key": "47326f8cc541840973c72f3cee62d53873f10303e919898f065b641375f0ef0c" } } ], "extra": [ 1, 188, 82, 46, 73, 136, 13, 102, 122, 132, 61, 97, 224, 245, 115, 197, 179, 218, 76, 196, 218, 234, 136, 30, 138, 51, 141, 220, 178, 40, 200, 118, 114 ], "signatures": [ "48b682feb4318d2e2a0cc57189456e6537e607b78429e85dd2fc4a7de6faa40e4b4d7061bac74e03b841fc8398b3e733daeb2c13ce4dc5200f032293ba5d230c", "dbaca6f3782ef2c8ea6f4da6a34ef5626f73f8ade24bd97a3fbdc8997d4b3c09f24fa3934f925b901115f36c589788a30f3ef5a6fd0ff9e9cec03a5784950b05"] }


Less details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-e06129bb4