Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: aa464bb8464cd6204ce23149e3892691c4fef0edaccca2ce9da6acd5abade583

Tx prefix hash: ab471f4523141842d005bb329052d99e384156b1194d9f8420dbc31fb1ecce13
Tx public key: 698468930ab7dad9baaf3a00581cc7507c1eb129d411caad52b5c909b379ab3a
Payment id: 4e5ae865991410635990a987a4b3c444099a3ec44e91b5b0f42839389984deb9
Timestamp: 1478935437 Timestamp [UTC]: 2016-11-12 07:23:57 Age [y:d:h:m:s]: 07:363:22:00:17
Block: 1177874 Fee (per_kB): 0.010000000000 (0.011729667812) Tx size: 0.8525 kB
Tx version: 1 No of confirmations: 2099485 RingCT/type: no
Extra: 0221004e5ae865991410635990a987a4b3c444099a3ec44e91b5b0f42839389984deb901698468930ab7dad9baaf3a00581cc7507c1eb129d411caad52b5c909b379ab3a

2 output(s) for total of 5.080000000000 xmr

stealth address amount amount idx tag
00: 2c4bf3a47a7c6486bd823f206c0c975360324ed899b78dc027a540607f9b79ec 0.080000000000 245619 of 269576 -
01: 5be6ee7a5f80205557553269e6f93264e703b43fb27d5fc8e40e0a4fdc9ced33 5.000000000000 238259 of 255089 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-10-01 02:52:24 till 2016-11-12 05:48:43; resolution: 4.55 days)

  • |_*___________________________*___________________________________________________________________________________________________________________________________________*|
  • |___________________*____________________________________________________________________________________________________________________________________________________**|
  • |__*____________________________________________________________________________________________________________________________________________________________________*_*|

3 inputs(s) for total of 5.090000000000 xmr

key image 00: a008ceddb6bd8c3401edd53fcba3da2b3c2b170fb79afb174beb7d9aad78af8c amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0ffb17527088f9620e2878efe820627aa85680ed8cd54039d382fe4163ae9362 00241287 4 10/62 2014-10-01 03:52:24 10:042:01:31:50
- 01: bbc250a02d938320686b077b1840be92681a374a97b1034911c455b5d0785ec9 00425718 0 0/5 2015-02-07 09:42:36 09:277:19:41:38
- 02: fe12210ed0bcb8a5c49abfb80770451f9601d4c40b4e81adb2f42a67b1f300f8 01177787 3 1/5 2016-11-12 04:06:49 07:364:01:17:25
key image 01: 17b702e212baaa09f886eebffc48c0c242af9c9ecff2932fd601c76d645609de amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3d76c78b8fb0d74da4c2aac16279566d12abb9f0c4970137b079c62b26553143 00362981 9 30/4 2014-12-25 11:26:13 09:321:17:58:01
- 01: 132a2563c9c126c6884d850737f0a33b357d3294bb506d864f1c915fb9636df4 01174327 3 6/27 2016-11-07 09:35:29 08:003:19:48:45
- 02: 9e9459a7fac7a31b29ed5afd5aa4e570cabcd93011793bc318379b857924a081 01177811 3 8/5 2016-11-12 04:48:43 07:364:00:35:31
key image 02: adf5133d64eb8f9412d22955fe69e1c6395e74ca2481dd86c0c829dd8bfa86f7 amount: 4.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1885c5ecf74075ddb8586ea84338c90c4e224ceed0249d40a956fd8e4f762d54 00252728 0 0/4 2014-10-09 04:19:53 10:034:01:04:21
- 01: 897712047b30c9b2d7fd95e2128702ffd2e760cb37e167131d5e94b12203e479 01169540 4 4/7 2016-10-31 16:20:14 08:010:13:04:00
- 02: 4d77ad772a698b2cc4386152e5ded3a6bfabc91d456e706546988a1a12698ec3 01177418 3 3/3 2016-11-11 15:26:41 07:364:13:57:33
More details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-e06129bb4