Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: a668220517b33f8701342b6f35e2f622014300bd6e737276f80cc92d3b40a047

Tx prefix hash: b429f6cca29f8a0370ab067e1dc6fff5bdf38b9f637bfd11bd53e8f434e1dda3
Tx public key: 43468221e004e1d5575e502a0958618f1b7369177e461788208476452a4d48c3
Timestamp: 1696016057 Timestamp [UTC]: 2023-09-29 19:34:17 Age [y:d:h:m:s]: 01:035:04:24:36
Block: 2985066 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1035 kB
Tx version: 2 No of confirmations: 287824 RingCT/type: yes/0
Extra: 0143468221e004e1d5575e502a0958618f1b7369177e461788208476452a4d48c3021100000019efeb4100000000000000000000

1 output(s) for total of 0.603166320000 xmr

stealth address amount amount idx tag
00: 343da603313ef986adb4f4a62ad3fe5315634c1f7f0d426e508113d8529d50cd 0.603166320000 80985426 of 0 <50>

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



{ "version": 2, "unlock_time": 2985126, "vin": [ { "gen": { "height": 2985066 } } ], "vout": [ { "amount": 603166320000, "target": { "tagged_key": { "key": "343da603313ef986adb4f4a62ad3fe5315634c1f7f0d426e508113d8529d50cd", "view_tag": "50" } } } ], "extra": [ 1, 67, 70, 130, 33, 224, 4, 225, 213, 87, 94, 80, 42, 9, 88, 97, 143, 27, 115, 105, 23, 126, 70, 23, 136, 32, 132, 118, 69, 42, 77, 72, 195, 2, 17, 0, 0, 0, 25, 239, 235, 65, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ], "rct_signatures": { "type": 0 } }


Less details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-e06129bb4