Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: a47353be10cc3a5a9b35e03b0c4d785ec384d10fc56e759436cfc0fde3775b2a

Tx prefix hash: f975185eecd49d36961b7b6d5ec7e944d18647ebf13b15433e4607d63838becc
Tx public key: bf60969dd4c4068451da5bd1acd72bb6623e0a9184a0bfb311fd366edc7dda2b
Timestamp: 1422075758 Timestamp [UTC]: 2015-01-24 05:02:38 Age [y:d:h:m:s]: 09:292:04:54:41
Block: 405351 Fee (per_kB): 0.100000000000 (0.351890034364) Tx size: 0.2842 kB
Tx version: 1 No of confirmations: 2872128 RingCT/type: no
Extra: 01bf60969dd4c4068451da5bd1acd72bb6623e0a9184a0bfb311fd366edc7dda2b

1 output(s) for total of 0.300000000000 xmr

stealth address amount amount idx tag
00: 6ed1198a2fcab09c65fa8f17972605f7e35f4a8e10cbb1f6c5fa2d6ed6d25895 0.300000000000 429816 of 976536 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-01-21 04:18:20 till 2015-01-21 07:58:08; resolution: 0.00 days)

  • |___________________________________________________________________________________________________________________________*______________________________________________|
  • |_______________________________________________*__________________________________________________________________________________________________________________________|

2 inputs(s) for total of 0.400000000000 xmr

key image 00: 6c03f32f7b398d5112e6c36b9266d39cece9da8088d053933380271c9da888ac amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b8b1b834d30183b14fee328ef1f799c56bab736dce094d471b663955d4abb324 00401182 1 8/49 2015-01-21 06:58:08 09:295:02:59:11
key image 01: 7dc9550d6c9f91edb107f93a6d0f881d47550e3751c9d9c763ab54bb7e71b730 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a435b3d2ae4d5fbdfc9d2f27c7d4f85c3a17ebde28e0e34f6dcb6c923ca0c49f 00401062 1 4/53 2015-01-21 05:18:20 09:295:04:38:59
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 200000000000, "key_offsets": [ 747390 ], "k_image": "6c03f32f7b398d5112e6c36b9266d39cece9da8088d053933380271c9da888ac" } }, { "key": { "amount": 200000000000, "key_offsets": [ 747207 ], "k_image": "7dc9550d6c9f91edb107f93a6d0f881d47550e3751c9d9c763ab54bb7e71b730" } } ], "vout": [ { "amount": 300000000000, "target": { "key": "6ed1198a2fcab09c65fa8f17972605f7e35f4a8e10cbb1f6c5fa2d6ed6d25895" } } ], "extra": [ 1, 191, 96, 150, 157, 212, 196, 6, 132, 81, 218, 91, 209, 172, 215, 43, 182, 98, 62, 10, 145, 132, 160, 191, 179, 17, 253, 54, 110, 220, 125, 218, 43 ], "signatures": [ "15e6186a23b8cdd2a6fc9f09dbd010ddfa60b4dce6c30dc0efaa75c4b8cfad0eec2e80b5917ec6418c62f601cd9734348a9aaa1f0d8487b827d600995787d300", "5870b635ca4c98954cb7b62f34d440159f788718c6e70a41fe4e2a28ef1319080bcb6cf0d2793a6813905e0b7ab771e92d29e168a5bead51377540268f6e6f09"] }


Less details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-e06129bb4