Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: b453b26ce30ab1b14eb4307f23d1665e1000c30ad55ecd3b3999cd8241993f47

Tx prefix hash: 739fedecdf842cfefac693ab22ffd6d37db1b74ab3789e5ef80bc92f1d19b57f
Tx public key: de0f6335ae0e52063db8dcedc60e07ec59b21eceea223f632c338315740e4388
Timestamp: 1674546326 Timestamp [UTC]: 2023-01-24 07:45:26 Age [y:d:h:m:s]: 01:290:03:55:29
Block: 2806477 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1035 kB
Tx version: 2 No of confirmations: 471068 RingCT/type: yes/0
Extra: 01de0f6335ae0e52063db8dcedc60e07ec59b21eceea223f632c338315740e43880211000000490c3bda00000000000000000000

1 output(s) for total of 0.602274640000 xmr

stealth address amount amount idx tag
00: 20a85f3bae1035a86393bfa65332a8bca639b152213fe92b3c7fd8f0676d1120 0.602274640000 67831969 of 0 <d5>

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



{ "version": 2, "unlock_time": 2806537, "vin": [ { "gen": { "height": 2806477 } } ], "vout": [ { "amount": 602274640000, "target": { "tagged_key": { "key": "20a85f3bae1035a86393bfa65332a8bca639b152213fe92b3c7fd8f0676d1120", "view_tag": "d5" } } } ], "extra": [ 1, 222, 15, 99, 53, 174, 14, 82, 6, 61, 184, 220, 237, 198, 14, 7, 236, 89, 178, 30, 206, 234, 34, 63, 99, 44, 51, 131, 21, 116, 14, 67, 136, 2, 17, 0, 0, 0, 73, 12, 59, 218, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ], "rct_signatures": { "type": 0 } }


Less details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-e06129bb4