Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: ca3fd6fd7bca2a95e261b1032e1826e8a9109bd1bd6ee033412ff3dffe542b5b

Tx prefix hash: 5f0e94ae63b967bedb4c82d6370b643c8ea1d3bd5f6a15e40ac721ed16bc4338
Tx public key: b6a29fcfb689bbe5c09fe237dd5564e7f2af259424463db0d8f16bc449a2f519
Timestamp: 1423315101 Timestamp [UTC]: 2015-02-07 13:18:21 Age [y:d:h:m:s]: 09:278:06:08:31
Block: 425969 Fee (per_kB): 0.100000000000 (0.351890034364) Tx size: 0.2842 kB
Tx version: 1 No of confirmations: 2851815 RingCT/type: no
Extra: 01b6a29fcfb689bbe5c09fe237dd5564e7f2af259424463db0d8f16bc449a2f519

1 output(s) for total of 0.300000000000 xmr

stealth address amount amount idx tag
00: dbe7acd410829d98966114842d32a9bfc2521ce3eca7d0e478ecf4cb5287a81c 0.300000000000 444431 of 976536 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-02-06 02:38:56 till 2015-02-07 01:57:16; resolution: 0.01 days)

  • |________*_________________________________________________________________________________________________________________________________________________________________|
  • |__________________________________________________________________________________________________________________________________________________________________*_______|

2 inputs(s) for total of 0.400000000000 xmr

key image 00: e1cc777a43641766c62b1e1b6e822bacb65203d167c0844e015661a17bc71fd8 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 314d6959f7d0d05bc463ddc8990b3a2d814854d3dc9e8d0dfc36ef822b275bc3 00423856 1 5/49 2015-02-06 03:38:56 09:279:15:47:56
key image 01: 1e51c0ba65fcedba0d713ab60bcc427da6c52deed763c83ae7f6e149b6d2e53f amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f4f6739f4382f146541f807dd5f02ca185e1f2ebb83c97d9439ad1641bada3d4 00425153 1 5/50 2015-02-07 00:57:16 09:278:18:29:36
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 200000000000, "key_offsets": [ 770696 ], "k_image": "e1cc777a43641766c62b1e1b6e822bacb65203d167c0844e015661a17bc71fd8" } }, { "key": { "amount": 200000000000, "key_offsets": [ 772096 ], "k_image": "1e51c0ba65fcedba0d713ab60bcc427da6c52deed763c83ae7f6e149b6d2e53f" } } ], "vout": [ { "amount": 300000000000, "target": { "key": "dbe7acd410829d98966114842d32a9bfc2521ce3eca7d0e478ecf4cb5287a81c" } } ], "extra": [ 1, 182, 162, 159, 207, 182, 137, 187, 229, 192, 159, 226, 55, 221, 85, 100, 231, 242, 175, 37, 148, 36, 70, 61, 176, 216, 241, 107, 196, 73, 162, 245, 25 ], "signatures": [ "e98576d0f9f8e2ea4ba3d49a0962fd0ff1a0f6d929b3094abba07ad85458140320392dc0c0c453c70c8b5a43975676f52408a955c9f3007881eb07dc29035509", "de7f5443aea8f9954a3109aa6c7314a6583f5dee3db6419e74b56a9a6188130f315fdb2d3023686617ef1dbd08522c63b2826d0f4c012c62554ed814545aa50d"] }


Less details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-e06129bb4