Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: 6faf71859bab21f3fb35cdbb3b6609a6ee534a953db5813889e6e6db7a2e7b5b

Tx prefix hash: 41e110ae5ee12bb59599a491a5c467c739cf29513ede090d2f31f2d9680c3931
Tx public key: edc7a3cf140547134bd8f51b2da253a5fd338e207d64073fb3b6e0618667b0cd
Timestamp: 1441145546 Timestamp [UTC]: 2015-09-01 22:12:26 Age [y:d:h:m:s]: 09:020:20:32:28
Block: 721024 Fee (per_kB): 0.050000000000 (0.177162629758) Tx size: 0.2822 kB
Tx version: 1 No of confirmations: 2520074 RingCT/type: no
Extra: 01edc7a3cf140547134bd8f51b2da253a5fd338e207d64073fb3b6e0618667b0cd

1 output(s) for total of 0.010000000000 xmr

stealth address amount amount idx tag
00: bb6e3572f14306bfd567d3e9514acb68f3241c36800d249b01b3d7443515a782 0.010000000000 394744 of 502466 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-09-01 20:31:10 till 2015-09-01 22:45:13; resolution: 0.00 days)

  • |______________________________________________________________________________________________*___________________________________________________________________________|
  • |____________________________________________________________________________*_____________________________________________________________________________________________|

2 inputs(s) for total of 0.060000000000 xmr

key image 00: d63dd2f95784f2f8aa9aa4096053764c67641964122d8c21cf5a8076cf5d4101 amount: 0.040000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ec4fd0d4b8bbf2fabde388e5c47da1e0f29f9ef922968c9a5940d72b265c2f7a 00721012 1 1/3 2015-09-01 21:45:13 09:020:20:59:41
key image 01: 0a62e407bbb6fa869987ea33babe28cba0bf6f75be3c5fc6cb334d581aa0d978 amount: 0.020000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1336af6d40ea2184cd1f02c43ff0c3879fc2c9b85808144f9f27a8d225654450 00721003 1 1/2 2015-09-01 21:31:10 09:020:21:13:44
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 40000000000, "key_offsets": [ 189126 ], "k_image": "d63dd2f95784f2f8aa9aa4096053764c67641964122d8c21cf5a8076cf5d4101" } }, { "key": { "amount": 20000000000, "key_offsets": [ 273367 ], "k_image": "0a62e407bbb6fa869987ea33babe28cba0bf6f75be3c5fc6cb334d581aa0d978" } } ], "vout": [ { "amount": 10000000000, "target": { "key": "bb6e3572f14306bfd567d3e9514acb68f3241c36800d249b01b3d7443515a782" } } ], "extra": [ 1, 237, 199, 163, 207, 20, 5, 71, 19, 75, 216, 245, 27, 45, 162, 83, 165, 253, 51, 142, 32, 125, 100, 7, 63, 179, 182, 224, 97, 134, 103, 176, 205 ], "signatures": [ "d3a5574aeb4345cf75fa6a0801dce4b1f81c052a76ea18905c0164015546910236023eeec90a490e8976608b69431e7f402ea0ecca4c22d393a14a479aae7106", "57717c5b0df572911906737827e86a13b218f34fbc99250422ddb3d7aec53c027db6ecb33916e0ce8a3f2990417e1051d28fc53e0bb59f50e52fd75bfd186c05"] }


Less details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-e06129bb4