Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: bff639ada9fae4bf4729d70ee09511a0821b1329aad77f1a96dfb2c42f5326ac

Tx prefix hash: ffe511b2259d3770240d5d01873ff8b969dab0070fe1010c27f88822f7f5baf9
Tx public key: 0875adfc0176a026e037078fb154b51ceca9f9dcd9490be9867eef4b116974b9
Timestamp: 1421660458 Timestamp [UTC]: 2015-01-19 09:40:58 Age [y:d:h:m:s]: 09:297:12:15:54
Block: 398507 Fee (per_kB): 0.100000000000 (0.351890034364) Tx size: 0.2842 kB
Tx version: 1 No of confirmations: 2879362 RingCT/type: no
Extra: 010875adfc0176a026e037078fb154b51ceca9f9dcd9490be9867eef4b116974b9

1 output(s) for total of 0.900000000000 xmr

stealth address amount amount idx tag
00: 48b1f2ff83076c6af384df34ac4938a2467d4fa704a617a6831956b161072262 0.900000000000 191346 of 454894 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-01-18 04:23:11 till 2015-01-18 17:37:08; resolution: 0.00 days)

  • |_____________________________________________________________________________________________________________________________________________________________*____________|
  • |_____________*____________________________________________________________________________________________________________________________________________________________|

2 inputs(s) for total of 1.000000000000 xmr

key image 00: 862c94286e09df251904f9c315b5930071fc3057d1b133a9112b7380e6e3cd16 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4ef55a7b5c1e8bb9718d26a67f52576149a322523862b65fe5cbf01d8e2a4e36 00397538 1 4/53 2015-01-18 16:37:08 09:298:05:19:44
key image 01: ae69ec6a44e30f9b0f2a180f5467c2779c42ec7f87c0cbbcc1e2fdee3f94b704 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: afaa01ef4151fd3012cf3858c12b46b0c8298c973088be84d974abc9d8141393 00396784 1 24/83 2015-01-18 05:23:11 09:298:16:33:41
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 500000000000, "key_offsets": [ 595794 ], "k_image": "862c94286e09df251904f9c315b5930071fc3057d1b133a9112b7380e6e3cd16" } }, { "key": { "amount": 500000000000, "key_offsets": [ 594884 ], "k_image": "ae69ec6a44e30f9b0f2a180f5467c2779c42ec7f87c0cbbcc1e2fdee3f94b704" } } ], "vout": [ { "amount": 900000000000, "target": { "key": "48b1f2ff83076c6af384df34ac4938a2467d4fa704a617a6831956b161072262" } } ], "extra": [ 1, 8, 117, 173, 252, 1, 118, 160, 38, 224, 55, 7, 143, 177, 84, 181, 28, 236, 169, 249, 220, 217, 73, 11, 233, 134, 126, 239, 75, 17, 105, 116, 185 ], "signatures": [ "5b54a18b3b89e691a0f2c94501d02f3a0905a1f857d3f157631c040b7371100e7f6cd719594182bfd42db28e39b4e2da6c5579fbba96724f23033330311ca000", "9d61376e05ef22ca5b581b03c3962a0e8a748e10846ec7f0dfa5877dfb02a70cafb3fb9ebb4ae7a34a9e3c025fed39298e7c3e6bcd663d1e1d7f666b5b356e04"] }


Less details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-e06129bb4