Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: 6c6a39a3ab722ec10dd4b3ddec87b5341e029454b37806f2a9426e6f34f0613c

Tx prefix hash: 48be64d46789e31c37c5aca2425ee5d47074046dfa8b78a77f37fecc890ffe20
Tx public key: b391c8227182e1ad6318da60fa7923dd6d421d80f187e2f71032d51d1675dbd6
Timestamp: 1419606768 Timestamp [UTC]: 2014-12-26 15:12:48 Age [y:d:h:m:s]: 09:315:20:03:26
Block: 364691 Fee (per_kB): 0.100000000000 (0.351890034364) Tx size: 0.2842 kB
Tx version: 1 No of confirmations: 2909272 RingCT/type: no
Extra: 01b391c8227182e1ad6318da60fa7923dd6d421d80f187e2f71032d51d1675dbd6

1 output(s) for total of 0.400000000000 xmr

stealth address amount amount idx tag
00: 6f6f7cc48d3627c2302ab6ba66bbc5779cf40635375265ecf1e62c5730f733bf 0.400000000000 314075 of 688584 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-12-26 08:47:54 till 2014-12-26 11:51:12; resolution: 0.00 days)

  • |________________________________________________________*_________________________________________________________________________________________________________________|
  • |__________________________________________________________________________________________________________________*_______________________________________________________|

2 inputs(s) for total of 0.500000000000 xmr

key image 00: 06580cd2e0da3f766432236a0b6fa7ebb3a2ccdea86622dd76366c1c6ebc38fd amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 53f0ca87aa1f72d9e9951bb420d10b4cb290843e6ee745c8885479fd6cf4e7a6 00364272 1 3/53 2014-12-26 09:47:54 09:316:01:28:20
key image 01: d700b916d1f825ad145ffe3886dddf83f4d410fd04fdd5e791b6b4b2424d3ca2 amount: 0.300000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c0ede75fefa6f8c87082add551c599c170b11cbd547e714ece7083f74dcbd7a5 00364360 1 6/58 2014-12-26 10:51:12 09:316:00:25:02
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 200000000000, "key_offsets": [ 701101 ], "k_image": "06580cd2e0da3f766432236a0b6fa7ebb3a2ccdea86622dd76366c1c6ebc38fd" } }, { "key": { "amount": 300000000000, "key_offsets": [ 390441 ], "k_image": "d700b916d1f825ad145ffe3886dddf83f4d410fd04fdd5e791b6b4b2424d3ca2" } } ], "vout": [ { "amount": 400000000000, "target": { "key": "6f6f7cc48d3627c2302ab6ba66bbc5779cf40635375265ecf1e62c5730f733bf" } } ], "extra": [ 1, 179, 145, 200, 34, 113, 130, 225, 173, 99, 24, 218, 96, 250, 121, 35, 221, 109, 66, 29, 128, 241, 135, 226, 247, 16, 50, 213, 29, 22, 117, 219, 214 ], "signatures": [ "bd4d26b6c18d7c9e0e6d8af8010f8c7e0125b3195e23c0f67b90bb4f0314130e2def31f8378b119f4b7784b3edbc05800af6f7e147a2e45b62c4436a6371ff0a", "008ca6de3aec09deb7580cffd3eb50f83f04b5774a976c4798145a052001cd0e2b0b1583732213514ccb13a33e0ef2c4a1a8b3b464c5c85d4342613ecb086608"] }


Less details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-e06129bb4