Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: 674554c74abb291f8270162a4dee1a747f50496f90514001230d749480b55f2e

Tx prefix hash: 49690d73748644deac29074535ac0008d43b2922fa45d456ea99fc0f9aaff6f4
Tx public key: d1af92131961330fb8e2fee2f81cf2bdab01551dbd2c7587ca76e1191ee5d17a
Timestamp: 1423838278 Timestamp [UTC]: 2015-02-13 14:37:58 Age [y:d:h:m:s]: 09:272:10:42:25
Block: 434625 Fee (per_kB): 0.100000000000 (0.351890034364) Tx size: 0.2842 kB
Tx version: 1 No of confirmations: 2843343 RingCT/type: no
Extra: 01d1af92131961330fb8e2fee2f81cf2bdab01551dbd2c7587ca76e1191ee5d17a

1 output(s) for total of 0.300000000000 xmr

stealth address amount amount idx tag
00: e9d492b04ae887a449dc98bb119d89295574894cccddd9f6db5fcebfd8b1b8d0 0.300000000000 450429 of 976536 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-02-11 19:32:17 till 2015-02-12 10:30:28; resolution: 0.00 days)

  • |____________*_____________________________________________________________________________________________________________________________________________________________|
  • |______________________________________________________________________________________________________________________________________________________________*___________|

2 inputs(s) for total of 0.400000000000 xmr

key image 00: 332f8c6ab2060a494cadf576bdcb56bb7a2116001d7461968960241a4144b385 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5e11932e922f1a2668e130a331519d792487dfc7b07279db3bddfe9de8724723 00432105 1 7/50 2015-02-11 20:32:17 09:274:04:48:06
key image 01: e9f8f4a3e69d9198266c2809738b1417ef59ea53e77d0e91a974eb83be22caf9 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e01f379cbe74843b9ad52564fd2142c57f64094f887af36557c8ee66ce6b89e2 00432857 1 15/52 2015-02-12 09:30:28 09:273:15:49:55
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 200000000000, "key_offsets": [ 778474 ], "k_image": "332f8c6ab2060a494cadf576bdcb56bb7a2116001d7461968960241a4144b385" } }, { "key": { "amount": 200000000000, "key_offsets": [ 779253 ], "k_image": "e9f8f4a3e69d9198266c2809738b1417ef59ea53e77d0e91a974eb83be22caf9" } } ], "vout": [ { "amount": 300000000000, "target": { "key": "e9d492b04ae887a449dc98bb119d89295574894cccddd9f6db5fcebfd8b1b8d0" } } ], "extra": [ 1, 209, 175, 146, 19, 25, 97, 51, 15, 184, 226, 254, 226, 248, 28, 242, 189, 171, 1, 85, 29, 189, 44, 117, 135, 202, 118, 225, 25, 30, 229, 209, 122 ], "signatures": [ "6e91b1da20b0a80b45af80e76a4d4856305c55b494dcb46f8ba6b71b6a195806786ee2a1c9d2975f9db4ba00661066448959a7c0872d7f914e39c7e30cb59404", "b9595cc980e5c26573ccb732f3b204f7fb4a5422370f4d8cf2ab374ae46ee00bddeeb99fc3a00faa298afbaaaf54a624016bd99712d0a4c1a87a10c6379d1601"] }


Less details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-e06129bb4