Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: 63bd1b84bdb5fde95bec5910659a7ea5226aa24b057e4b925b089ee2da77cece

Tx prefix hash: d1daaf579a31cbe7dff44cd31405663b9281e3d71b1f3a3c0095a2dbea547b6d
Tx public key: f995ec6ac09af3b6e0ede739b0832827db71f79e2f4cdfdf7e1d6b6f977eb213
Timestamp: 1419970714 Timestamp [UTC]: 2014-12-30 20:18:34 Age [y:d:h:m:s]: 09:310:23:36:27
Block: 370746 Fee (per_kB): 0.100000000000 (0.351890034364) Tx size: 0.2842 kB
Tx version: 1 No of confirmations: 2902761 RingCT/type: no
Extra: 01f995ec6ac09af3b6e0ede739b0832827db71f79e2f4cdfdf7e1d6b6f977eb213

1 output(s) for total of 0.900000000000 xmr

stealth address amount amount idx tag
00: c3e391c9056a05dc6af4c03d934624b8a8cf93e1e83a2fff34444cfb5d9a363c 0.900000000000 185564 of 454894 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-12-30 07:53:00 till 2014-12-30 10:50:05; resolution: 0.00 days)

  • |________________________________________________________________________________________________________________*_________________________________________________________|
  • |__________________________________________________________*_______________________________________________________________________________________________________________|

2 inputs(s) for total of 1.000000000000 xmr

key image 00: f8ef76f77b0c6be90cd279ba55639a74ee645034170a6426b218509fd7bd65b1 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c6cccd70e8109ccd58e62130ebddf5445ce9f7bb507927795fa3d108f96446f2 00370078 1 7/53 2014-12-30 09:50:05 09:311:10:04:56
key image 01: 2edca77fd9878b693969e8711ff89dcddfd93bf597f58245bf533ad6cfb8713a amount: 0.800000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 72e5996ee16147c9b4194d7bab10f10d6297dc8f0f56509041df3a26ee5f063e 00370020 1 3/54 2014-12-30 08:53:00 09:311:11:02:01
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 200000000000, "key_offsets": [ 707998 ], "k_image": "f8ef76f77b0c6be90cd279ba55639a74ee645034170a6426b218509fd7bd65b1" } }, { "key": { "amount": 800000000000, "key_offsets": [ 227079 ], "k_image": "2edca77fd9878b693969e8711ff89dcddfd93bf597f58245bf533ad6cfb8713a" } } ], "vout": [ { "amount": 900000000000, "target": { "key": "c3e391c9056a05dc6af4c03d934624b8a8cf93e1e83a2fff34444cfb5d9a363c" } } ], "extra": [ 1, 249, 149, 236, 106, 192, 154, 243, 182, 224, 237, 231, 57, 176, 131, 40, 39, 219, 113, 247, 158, 47, 76, 223, 223, 126, 29, 107, 111, 151, 126, 178, 19 ], "signatures": [ "5bcfb8f2915611de093016d85787285151abf7f56acce3bfcb3b5187d890aa0c88d6734dcf39d6160ee2ee2a55bca471ce29e0545fad1ac0bea265633fb5960f", "21a224740931c6838db78bd7ec2a7cde1c3893d72e3db86fa9f0db40c6f20e06510f058e72d771394ff4e24f891664c69eaf276fa59b23c5f4d9efbff936900c"] }


Less details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-e06129bb4