Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is ON (10 s)

Tx hash: 5236934ba6e9ccf898e5ce2308d9107107ef4a6005eeeef93a54208106b3e384

Tx prefix hash: bc1fa50343f46e9986c2f66d8d35cab7c5900d624f9f278fa359afed7aeceb95
Tx public key: 7d8d7adce54f7e79487c743ce630925e0f21e0cb20eed777854b0da1cccf65a8
Payment id (encrypted): 293e728141fc8a68
Timestamp: 1515118465 Timestamp [UTC]: 2018-01-05 02:14:25 Age [y:d:h:m:s]: 06:309:00:16:04
Block: 1480136 Fee (per_kB): 0.028000000000 (0.002116795866) Tx size: 13.2275 kB
Tx version: 2 No of confirmations: 1796467 RingCT/type: yes/2
Extra: 020901293e728141fc8a68017d8d7adce54f7e79487c743ce630925e0f21e0cb20eed777854b0da1cccf65a8

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: 3207332f5bc8776b9f66d67b98f855efe164c9ad7a1c5cce2a1adb2960b05f14 ? 4157201 of 118879705 -
01: 3bdfe7d8b9540d0398036f4b605fe2202d1bc831416bb4c3697d83f2f2054c82 ? 4157202 of 118879705 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-23 10:31:57 till 2016-12-17 18:49:52; resolution: 5.34 days)

  • |_*__*____*______________________________________________________________________________________*________________________________________________________________________*|
  • |_________*_______________________________*__________________________________________*_________*__________________________________________________________________________*|

2 inputs(s) for total of 5.900000000000 xmr

key image 00: 2edef3c754d723af67e611430a12aac228d6e63f9b26ef7c8defc71ecf4c70e8 amount: 0.900000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 525ffbf002f363bfab87cf57a1b939f043411df243ae31f4f717d7c2cd2aec3d 00098026 1 31/64 2014-06-23 11:31:57 10:140:14:58:32
- 01: 93bcb11598dbcae403c3e0a8af70dda2d4225f7781580924672cf947ce6919db 00122622 1 18/71 2014-07-10 13:38:35 10:123:12:51:54
- 02: 5a0dfa2a15a41b7f1284e3dd2136fe973066413db8f13dfacdf36f3c15b8b6ab 00166213 5 21/45 2014-08-09 19:07:51 10:093:07:22:38
- 03: 337921e8fa45954179d62d494ce9350528b91d8cab8a4479a216dc899c7097eb 00835150 0 0/4 2015-11-21 06:27:21 08:354:20:03:08
- 04: 5757045e5927280e15262e2238498063d6fef3913db68e4b05d01e66ef5c2eb3 01203556 3 6/11 2016-12-17 17:49:52 07:327:08:40:37
key image 01: 02919608ca454990bc6dbe15d8aec5dc90058afd64f34ae6dafb8fac30e339be amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6f60641bc29dc52bcbf8f8dfb715cd849358a799cb30d18969dc21a300db5226 00161628 0 0/5 2014-08-06 14:15:12 10:096:12:15:17
- 01: e11eb2e482ab141240dfcb4683677c7c350822ce67083cd89b313271e0734a4e 00411685 1 4/4 2015-01-28 14:40:32 09:286:11:49:57
- 02: f1920063d54bcf8ce3b455b2745f7195c27956e4a257fa4540c84014526c95f9 00741670 1 2/7 2015-09-16 10:17:43 09:055:16:12:46
- 03: 1aa03c4bc91e558bc54cf502bf42e135865f3ec071f33ea185252d8ce1a71136 00814929 1 8/21 2015-11-06 21:00:09 09:004:05:30:20
- 04: cf411c280a339cb0d16392e074dadbf71d7f73212372edad4a629c2b8cff63eb 01203556 3 6/11 2016-12-17 17:49:52 07:327:08:40:37
More details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-e06129bb4