Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: b427444f3ab349a77e719b0f28898ac90f8236328975391cae2592c9e2fbab74

Tx prefix hash: bc40c7a0592ffb4031c563e01a9489f2ba31453dde508cfea25cf717b42b20d0
Tx public key: bd4cc1592551509a2db82617bb483fafb137e697f605624f053e8697c563002e
Timestamp: 1661361362 Timestamp [UTC]: 2022-08-24 17:16:02 Age [y:d:h:m:s]: 02:068:00:27:58
Block: 2696722 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1035 kB
Tx version: 2 No of confirmations: 573858 RingCT/type: yes/0
Extra: 01bd4cc1592551509a2db82617bb483fafb137e697f605624f053e8697c563002e021100000f0e4d715a00000000000000000000

1 output(s) for total of 0.600535940000 xmr

stealth address amount amount idx tag
00: 2a97702394062db0528796b780c5a43943da6a42023500f6ac00da032a35ee6e 0.600535940000 60206733 of 0 <49>

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



{ "version": 2, "unlock_time": 2696782, "vin": [ { "gen": { "height": 2696722 } } ], "vout": [ { "amount": 600535940000, "target": { "tagged_key": { "key": "2a97702394062db0528796b780c5a43943da6a42023500f6ac00da032a35ee6e", "view_tag": "49" } } } ], "extra": [ 1, 189, 76, 193, 89, 37, 81, 80, 154, 45, 184, 38, 23, 187, 72, 63, 175, 177, 55, 230, 151, 246, 5, 98, 79, 5, 62, 134, 151, 197, 99, 0, 46, 2, 17, 0, 0, 15, 14, 77, 113, 90, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ], "rct_signatures": { "type": 0 } }


Less details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-e06129bb4