Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: b6377fc3043d23a35b11e5548ca2efddb6fed588570f06080cb2e60adf2e85f4

Tx prefix hash: 16915d8a82e1f2719ca374f93a8145f4854e11ccd719ef0a823335bc5877ff35
Tx public key: 1056fbd66ea83bdac834bb1314d5a83a4aa7858803a4f891156fc247b2408c8e
Timestamp: 1420147445 Timestamp [UTC]: 2015-01-01 21:24:05 Age [y:d:h:m:s]: 09:308:21:05:59
Block: 373601 Fee (per_kB): 0.100000000000 (0.351890034364) Tx size: 0.2842 kB
Tx version: 1 No of confirmations: 2899869 RingCT/type: no
Extra: 011056fbd66ea83bdac834bb1314d5a83a4aa7858803a4f891156fc247b2408c8e

1 output(s) for total of 0.300000000000 xmr

stealth address amount amount idx tag
00: a42754476ca8be3f973ddee63fb85a964eaf62a617b983d366f0ee1ac0a83488 0.300000000000 400505 of 976536 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-12-29 21:11:02 till 2014-12-30 00:14:32; resolution: 0.00 days)

  • |__________________________________________________________________________________________________________________*_______________________________________________________|
  • |________________________________________________________*_________________________________________________________________________________________________________________|

2 inputs(s) for total of 0.400000000000 xmr

key image 00: a60b312fb2d45decf47ac4b680bd9a27868e19fbaa767081133a61da6a6c4f85 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c22453546e47a074f8c30c6bca501e2b9538b62655d85df45f4f4862da4ee5a0 00369453 1 1/32 2014-12-29 23:14:32 09:311:19:15:32
key image 01: 36b4c45cf51f2d0a47daf54212026556bfde478ff042cd12b6746ded251b2108 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e57d8b0668714b736cd864a27aa72ba180c4e465228f2f40682ca078925f4cea 00369393 1 8/47 2014-12-29 22:11:02 09:311:20:19:02
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 200000000000, "key_offsets": [ 707184 ], "k_image": "a60b312fb2d45decf47ac4b680bd9a27868e19fbaa767081133a61da6a6c4f85" } }, { "key": { "amount": 200000000000, "key_offsets": [ 707098 ], "k_image": "36b4c45cf51f2d0a47daf54212026556bfde478ff042cd12b6746ded251b2108" } } ], "vout": [ { "amount": 300000000000, "target": { "key": "a42754476ca8be3f973ddee63fb85a964eaf62a617b983d366f0ee1ac0a83488" } } ], "extra": [ 1, 16, 86, 251, 214, 110, 168, 59, 218, 200, 52, 187, 19, 20, 213, 168, 58, 74, 167, 133, 136, 3, 164, 248, 145, 21, 111, 194, 71, 178, 64, 140, 142 ], "signatures": [ "3fba8c2143b7db9394f72c296e6579aa7c04202da6225fffb89259776486960aa993347c7454c40a451fdb6a556791528312203e6c6990c6d7da1e50888cb201", "e9be9b8c584258f867884e310fdf1dfc5ca62cb57b22b7a96491218dcc55880c18d2688273f087f745811506aaf2d9b8cc6b3f6a2aeac81df8c994bfd73fdf06"] }


Less details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-e06129bb4