Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: 878f7d2786b621b5433092c3a593733c8710df69c8f98706f53243829ae73c20

Tx prefix hash: bb54447000167a25ddb79715eae71b5f6a2bbcaff11b66078bc2bb3e6c509ab5
Tx public key: dfebfcccbf3433b580f10439d5d77e1ed4f6d93b332f9a0f7a891570e8045313
Payment id: 5bd4faab21454e79a8cec2ffba03ebd27b4152f2a5974575bf8365351a013dd9
Timestamp: 1472089146 Timestamp [UTC]: 2016-08-25 01:39:06 Age [y:d:h:m:s]: 08:071:01:01:17
Block: 1120908 Fee (per_kB): 0.020000000000 (0.019787439614) Tx size: 1.0107 kB
Tx version: 1 No of confirmations: 2151342 RingCT/type: no
Extra: 0221005bd4faab21454e79a8cec2ffba03ebd27b4152f2a5974575bf8365351a013dd901dfebfcccbf3433b580f10439d5d77e1ed4f6d93b332f9a0f7a891570e8045313

2 output(s) for total of 0.380000000000 xmr

stealth address amount amount idx tag
00: 40171357b2c3e15a94bb71f29c151c677c41c3407e7dc266ec0e42072865f34a 0.080000000000 217310 of 269576 -
01: 5720650099d37f08b1171813233103de900029a875492ce5705905c6831cf838 0.300000000000 852319 of 976536 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-01 13:59:56 till 2016-04-15 23:36:58; resolution: 3.85 days)

  • |_*______________________________________________________________________*_________*_________*__________________________________________________________*_________________*|
  • |___________________________________________________________*__*____________________*____________________________*_________*__________________________________*____________|

2 inputs(s) for total of 0.400000000000 xmr

key image 00: 2952c98086d8d8ec0e62f9a7fb4e4e036a6d60c5b3cfe4c8c4e3eced141ba139 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: bfb5ea164932e45915c002e5af087bc0162f900ec812fa840cfdabb0a05955d4 00109804 1 7/55 2014-07-01 14:59:56 10:126:11:40:27
- 01: a544b55bcbae0292a7945cf532b30c920b81f34dae74541d959a530f6a602b55 00507951 1 12/50 2015-04-05 18:44:58 09:213:07:55:25
- 02: 0dfd84d1f328dbf63c3dcd774d43c051897f1b114f27ddffc8affbe6f9847f82 00560626 1 7/48 2015-05-12 14:22:38 09:176:12:17:45
- 03: 31892298ecf9c147bfb72c2dc8eee15b6ea7ed661490cee30e94d98be1e096a1 00619449 5 26/8 2015-06-22 17:52:50 09:135:08:47:33
- 04: 21218f2ce1606d44db3c6edd4b15fa318085aea883762c49123529d2a890fdb6 00939612 4 2/11 2016-02-03 02:23:21 08:275:00:17:02
- 05: 99eff4971bef86c974e203f7ff8d3e77aab3652c7e345dc1a62824dfb04f58fb 01026505 3 12/28 2016-04-15 22:36:58 08:202:04:03:25
key image 01: 5055a102d46a16444af89530d21cba8e210d5c5b64b0ec1006ed7629f37824e5 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 54ece2957d235054b2e759985f46975b3c2fa6136baa062230da87de2cc936f7 00434503 1 2/51 2015-02-13 12:41:14 09:264:13:59:09
- 01: df0f3622c14f4ad2bc5588000f57e402aecaa84d72243e8f4b69325576d7ead9 00451374 1 18/30 2015-02-25 07:35:08 09:252:19:05:15
- 02: ece7753b6ba367863cf2f5ce4b863b84030025335f8e24ef45aeff6d7df9d8de 00564349 1 9/2 2015-05-15 05:54:28 09:173:20:45:55
- 03: 6ebc62b22451e0ba4fe809da3e6ebfe711820ea5ba8406e41c29c1e2bb82f442 00728133 1 16/41 2015-09-06 22:13:44 09:059:04:26:39
- 04: 541afff01bd5c6b32aa63e66d739380a11ba4863fd3a8267ce473f0e64dfa78f 00781971 1 35/44 2015-10-14 16:19:37 09:021:10:20:46
- 05: 99c4d8b45c1e67c3c56ea0bcb84720b6f4c791d5ad512e2bfb0c4e85fe619089 00976809 4 5/12 2016-02-29 09:31:16 08:248:17:09:07
More details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-e06129bb4