Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: ad5283816543e5ea16128b938f1c12f8ed0f984a0c4ee6e04bb2b8f92dc30265

Tx prefix hash: 25065e38d1e57860240fbd0a8006501ed7048e8bccf8a9afb31494c25163bae9
Tx public key: 507ff16b2f5ed8ea8405783dc65ed2f7c97e8c050f7ad5e609c2f4455645ca87
Timestamp: 1406242918 Timestamp [UTC]: 2014-07-24 23:01:58 Age [y:d:h:m:s]: 10:110:22:54:54
Block: 143419 Fee (per_kB): 0.005000000000 (0.017655172414) Tx size: 0.2832 kB
Tx version: 1 No of confirmations: 3134449 RingCT/type: no
Extra: 01507ff16b2f5ed8ea8405783dc65ed2f7c97e8c050f7ad5e609c2f4455645ca87

1 output(s) for total of 0.100000000000 xmr

stealth address amount amount idx tag
00: 19d47ce2fe723f9537291c108fa945faf6f2b03f5830118dea1e680fb3934d1c 0.100000000000 316117 of 982315 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-24 20:29:29 till 2014-07-24 23:31:17; resolution: 0.00 days)

  • |________________________________________________________*_________________________________________________________________________________________________________________|
  • |__________________________________________________________________________________________________________________*_______________________________________________________|

2 inputs(s) for total of 0.105000000000 xmr

key image 00: 22cd293e95522235bd9701749f2d9f39b5784baf5ebe7ac9304df616e500f752 amount: 0.005000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0a3cdd81ffd70001b0e9c48f8419517481784ac27e978ed59450b10a9103ef74 00143331 1 17/7 2014-07-24 21:29:29 10:111:00:27:23
key image 01: c5dcea4dd293f5c4bd7b34c4c66a740224e3a9a0653915ed5e1dfddd8dacbb7c amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d28deaf8bb101f3b1c1a61726c4f7dc3aacf80adb1c83d2c3e0c57e214e84a7b 00143394 1 2/4 2014-07-24 22:31:17 10:110:23:25:35
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000, "key_offsets": [ 194372 ], "k_image": "22cd293e95522235bd9701749f2d9f39b5784baf5ebe7ac9304df616e500f752" } }, { "key": { "amount": 100000000000, "key_offsets": [ 316085 ], "k_image": "c5dcea4dd293f5c4bd7b34c4c66a740224e3a9a0653915ed5e1dfddd8dacbb7c" } } ], "vout": [ { "amount": 100000000000, "target": { "key": "19d47ce2fe723f9537291c108fa945faf6f2b03f5830118dea1e680fb3934d1c" } } ], "extra": [ 1, 80, 127, 241, 107, 47, 94, 216, 234, 132, 5, 120, 61, 198, 94, 210, 247, 201, 126, 140, 5, 15, 122, 213, 230, 9, 194, 244, 69, 86, 69, 202, 135 ], "signatures": [ "dfb0aac3ad6826efe6c2de1ad1e04f12bf1fe45f5b0a1ad6196a214a8f47d20c0ed2ce9db91c288ab718526977ba2d0a12588776069c91558abf01bc070c0c09", "af7688587f2d126c5c95d919bd360e3f44c0e8fcfb4aa01a3213b0020861260976a38c3c38923baf6f0bd73c26b589dc48f221ac70626f9e60be6d987634f20d"] }


Less details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-e06129bb4