Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: aada06214cb53b39dda45abb9150134f4acc2a2e58dd3db35bd82149168a15be

Tx prefix hash: d8b2906c264becce32e43660e8fb9a908d36f3e33f9268dd7e394044f10ed808
Tx public key: af4a3fe8c48047b9337e629068e8befde9335a9b7b43b1ab3d789b061338db40
Payment id: d03ad1e26631703eaf007b4a8189dc08074824e5962c556d7fc61d019af2671b
Timestamp: 1476300083 Timestamp [UTC]: 2016-10-12 19:21:23 Age [y:d:h:m:s]: 07:342:02:13:49
Block: 1156047 Fee (per_kB): 0.020000000000 (0.022780867631) Tx size: 0.8779 kB
Tx version: 1 No of confirmations: 2083693 RingCT/type: no
Extra: 022100d03ad1e26631703eaf007b4a8189dc08074824e5962c556d7fc61d019af2671b01af4a3fe8c48047b9337e629068e8befde9335a9b7b43b1ab3d789b061338db40

2 output(s) for total of 20.000000000000 xmr

stealth address amount amount idx tag
00: 674072a662516345be48352dcd8046928ef3e579fa2ccb7355624c4b57652e34 10.000000000000 890571 of 921411 -
01: fa727568506f859e7d16a23fd8a9bda48aed07da595b752e2dc5e9f13cc7b5c7 10.000000000000 890572 of 921411 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-12 18:52:09 till 2016-10-12 20:04:05; resolution: 5.02 days)

  • |_*__________*__________________________________________________________________*________________*________________________________________________________________________*|
  • |__________________________*______________________________________________________________________________________________*____________________*_________*________________*|

2 inputs(s) for total of 20.020000000000 xmr

key image 00: ddba8700dd66a322381a4ad70b1bde09c780311cc77ebf2ef25cd1eb68ef1c24 amount: 0.020000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d5f11fafb23c47835e3ff974219ddf7060e587d022e8f3107bd84f88297cc46c 00082410 1 2/131 2014-06-12 19:52:09 10:100:01:43:03
- 01: 343628adb32aec0e0d61dcc719996dfa3259df82dd556317ef2dddcee95d4604 00168462 0 0/4 2014-08-11 08:52:54 10:040:12:42:18
- 02: 9add286115a2e48a3962413b3eb10af9ab11f14b9cdf0da5d1aad92c89e6908d 00649147 4 2/156 2015-07-13 12:38:40 09:069:08:56:32
- 03: 6f9e5101697d8523302eb2273a8f6490526088cc0ee830bdc99b77c79b0c70f8 00770283 1 4/11 2015-10-06 12:34:38 08:349:09:00:34
- 04: 4025d66eb25bf0594bc8f604d401082c02b9cd763763f200d570266785931875 01156036 5 3/4 2016-10-12 19:04:05 07:342:02:31:07
key image 01: 18e1744978170651d1f1b9c3b308d0409c9e6df59902d0a0777ed211da814b16 amount: 20.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: aed22d851a378bd4545656f5931e621804787f6d1edbfedbddebf74ba6ee183e 00266800 1 11/6 2014-10-19 00:11:14 09:336:21:23:58
- 01: 4fb625875461e78fb88fe9687ded718ab673463a8e2d4b562f8223bf8eef0c8c 00954023 3 2/13 2016-02-13 06:43:03 08:219:14:52:09
- 02: 49b2808c36279eb006ab5312f9254018433cc25bd344a73a997fe70aae55cebf 01056671 3 18/7 2016-05-27 21:36:36 08:114:23:58:36
- 03: 86c7e7aa90ecdf77b0823d2657bac9e3676f4186de043cb043b69625a9255597 01092635 3 6/7 2016-07-16 15:47:03 08:065:05:48:09
- 04: cdda963a643eca427e4ce339131a9cb01266ed8625722f372f50c45855052b34 01156035 5 1/5 2016-10-12 18:57:37 07:342:02:37:35
More details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-e06129bb4