Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: a6f61ac3de254e78b3efebf5356e0bf3535e06f69928bf5d103ebf964f6663e0

Tx prefix hash: aff03868706365582d67d5a79dc54d16710334c5d9106cdcea5e6bf8fc52fdc1
Tx public key: a102124c380afc04683cfd76b60b090c632f9cf4c829e92f51903c8fbac32170
Timestamp: 1672881461 Timestamp [UTC]: 2023-01-05 01:17:41 Age [y:d:h:m:s]: 01:306:07:14:31
Block: 2792597 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1035 kB
Tx version: 2 No of confirmations: 482730 RingCT/type: yes/0
Extra: 01a102124c380afc04683cfd76b60b090c632f9cf4c829e92f51903c8fbac3217002110000000e584b2b00000000000000000000

1 output(s) for total of 0.603356400000 xmr

stealth address amount amount idx tag
00: 9097a27d2b6514ba0e5343da39553d0402919c186f312c359d3889045a5204db 0.603356400000 66936970 of 0 <56>

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



{ "version": 2, "unlock_time": 2792657, "vin": [ { "gen": { "height": 2792597 } } ], "vout": [ { "amount": 603356400000, "target": { "tagged_key": { "key": "9097a27d2b6514ba0e5343da39553d0402919c186f312c359d3889045a5204db", "view_tag": "56" } } } ], "extra": [ 1, 161, 2, 18, 76, 56, 10, 252, 4, 104, 60, 253, 118, 182, 11, 9, 12, 99, 47, 156, 244, 200, 41, 233, 47, 81, 144, 60, 143, 186, 195, 33, 112, 2, 17, 0, 0, 0, 14, 88, 75, 43, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ], "rct_signatures": { "type": 0 } }


Less details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-e06129bb4