Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: 50e3ed2fc485454b4b69fe5576a81a6859748f7e5e6b3760fb487a9d4fbf523a

Tx prefix hash: eff6dd092238f115d4b745dcec89375acdff8b005971d7a20a615a80b32db915
Tx public key: 22fa5151adafb529a6114bf58563e5e15572c9d48d73ee05939b94bedf0a10c4
Timestamp: 1423999938 Timestamp [UTC]: 2015-02-15 11:32:18 Age [y:d:h:m:s]: 09:260:20:53:05
Block: 437283 Fee (per_kB): 0.100000000000 (0.351890034364) Tx size: 0.2842 kB
Tx version: 1 No of confirmations: 2833728 RingCT/type: no
Extra: 0122fa5151adafb529a6114bf58563e5e15572c9d48d73ee05939b94bedf0a10c4

1 output(s) for total of 0.300000000000 xmr

stealth address amount amount idx tag
00: c4f1591bca99655a67abe28eaf5f6621cd8a190b9a0a5ba1a4d7130e8ea5ccc2 0.300000000000 452185 of 976536 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-02-14 22:28:07 till 2015-02-15 05:18:52; resolution: 0.00 days)

  • |_________________________*________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________*________________________|

2 inputs(s) for total of 0.400000000000 xmr

key image 00: 54db05774bcc33721458a233cc21c11317d4515df64f96f80deef51fd34ce0f1 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d5c6569d9cd1c3227bf03dad078635dfebd3efa695bcf20db6e9dc4be643dabd 00436557 1 9/51 2015-02-14 23:28:07 09:261:08:57:16
key image 01: 48bafac4190c997d5ba28523d56d4bfae676f76606fcb1797ec7c9abb452da12 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1fd3fc2e373166ce9c1332a2b58a8f8efc9ed7ec8dae7dc3da0047b9bc3626c8 00436797 1 12/41 2015-02-15 04:18:52 09:261:04:06:31
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 200000000000, "key_offsets": [ 782893 ], "k_image": "54db05774bcc33721458a233cc21c11317d4515df64f96f80deef51fd34ce0f1" } }, { "key": { "amount": 200000000000, "key_offsets": [ 783191 ], "k_image": "48bafac4190c997d5ba28523d56d4bfae676f76606fcb1797ec7c9abb452da12" } } ], "vout": [ { "amount": 300000000000, "target": { "key": "c4f1591bca99655a67abe28eaf5f6621cd8a190b9a0a5ba1a4d7130e8ea5ccc2" } } ], "extra": [ 1, 34, 250, 81, 81, 173, 175, 181, 41, 166, 17, 75, 245, 133, 99, 229, 225, 85, 114, 201, 212, 141, 115, 238, 5, 147, 155, 148, 190, 223, 10, 16, 196 ], "signatures": [ "e35cf97669d0ee16cf3044d846b21fd020b5938434e51642e3f68c36b5c67400404866451edd32a2a2857e0b052f0d09c49f3f991a3aa07ebb03eb6fc3922e0e", "c4d5cc24c3a1d870a51152ba0375dac175df9b86ae407aa2816dc39c3946e901c4aaee234c6381fe58464e644ec051715e60a04074b7e1d0a5e2f9ebe82d6e0b"] }


Less details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-e06129bb4