Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: 82bb41df9fe8b8398db44cb3ec879af9fb02741af154cd2980a5f0ca4fc7aafc

Tx prefix hash: 1b785ca8c04e8ce69234cf58e2da92f193f8b57770bd5370165eecb54a2a0d47
Tx public key: 40039cbfa8a92b197f9d48970593dc7312f3f38d8b0c162de3db5444884d3a1f
Payment id: 3a4badd35426e4fd800b7a3e9b141c619545b2dac2ddfc6623bc49f3b81ffc65
Timestamp: 1404668250 Timestamp [UTC]: 2014-07-06 17:37:30 Age [y:d:h:m:s]: 10:123:01:01:53
Block: 117168 Fee (per_kB): 0.010000000000 (0.031507692308) Tx size: 0.3174 kB
Tx version: 1 No of confirmations: 3156304 RingCT/type: no
Extra: 0221003a4badd35426e4fd800b7a3e9b141c619545b2dac2ddfc6623bc49f3b81ffc650140039cbfa8a92b197f9d48970593dc7312f3f38d8b0c162de3db5444884d3a1f

1 output(s) for total of 3.000000000000 xmr

stealth address amount amount idx tag
00: 1c648e4deea429dd6c3935b9f58503a0e2b1366b71965f4a181e92d091c7e33f 3.000000000000 22500 of 300495 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-06 14:42:14 till 2014-07-06 17:22:48; resolution: 0.00 days)

  • |__________________________________________________________________________________________________________*_______________________________________________________________|
  • |________________________________________________________________*_________________________________________________________________________________________________________|

2 inputs(s) for total of 3.010000000000 xmr

key image 00: 38219c5a029283883c7f408a24b76a67d8a7b78fb163c68b88f0915151d0380d amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 620957dda686be6f19ae7b4c0bf82a3a93584ef97a3654c809fc74a540c86a0f 00117089 1 47/75 2014-07-06 16:22:48 10:123:02:16:35
key image 01: 8da772148b1027d4dafc2a3ab8c912a883e0faa0c61b9a53c3f1efaefa1acc68 amount: 0.010000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 145a5d99135c98f2bdb1b052a36ceee7972784b054e0800eb9e53bf642f0e4b2 00117039 1 2/2 2014-07-06 15:42:14 10:123:02:57:09
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 3000000000000, "key_offsets": [ 22461 ], "k_image": "38219c5a029283883c7f408a24b76a67d8a7b78fb163c68b88f0915151d0380d" } }, { "key": { "amount": 10000000000, "key_offsets": [ 310864 ], "k_image": "8da772148b1027d4dafc2a3ab8c912a883e0faa0c61b9a53c3f1efaefa1acc68" } } ], "vout": [ { "amount": 3000000000000, "target": { "key": "1c648e4deea429dd6c3935b9f58503a0e2b1366b71965f4a181e92d091c7e33f" } } ], "extra": [ 2, 33, 0, 58, 75, 173, 211, 84, 38, 228, 253, 128, 11, 122, 62, 155, 20, 28, 97, 149, 69, 178, 218, 194, 221, 252, 102, 35, 188, 73, 243, 184, 31, 252, 101, 1, 64, 3, 156, 191, 168, 169, 43, 25, 127, 157, 72, 151, 5, 147, 220, 115, 18, 243, 243, 141, 139, 12, 22, 45, 227, 219, 84, 68, 136, 77, 58, 31 ], "signatures": [ "b88434847e5c405a84df8af3472de3a7fa6f3ab70e808dfe2681e6b37b89440682adebdef8a98c2fbd92ecb303f0ab4d792ee9cea501ca541c689f06ee94dd03", "bcff3f9b83a5efcfff7a23602beaeff25a4c7e4947e9282ccd000cb0c971d40679c8d5dd2ab7e665a7f6de8ff95aee84f1aa6d6ac953e887c936078b4331ab0a"] }


Less details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-e06129bb4