Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: d14e678ebfc151d6938acffbe5f07b31518a98ec9caeed9ef081d6042d108a86

Tx prefix hash: 6ec8b4e73c64ce37141d8b08a130530e4ad2180346c41ff44101ad355377da50
Tx public key: a4c4bdcf3cb75320394d3d1163e9380d5b3904f792de8d8950a1d6d59c13e5bf
Timestamp: 1473513005 Timestamp [UTC]: 2016-09-10 13:10:05 Age [y:d:h:m:s]: 08:009:16:10:41
Block: 1132973 Fee (per_kB): 0.015000000000 (0.019973992198) Tx size: 0.7510 kB
Tx version: 1 No of confirmations: 2107030 RingCT/type: no
Extra: 01a4c4bdcf3cb75320394d3d1163e9380d5b3904f792de8d8950a1d6d59c13e5bf

3 output(s) for total of 0.395000000000 xmr

stealth address amount amount idx tag
00: fca783e170dc3a7c399d5291ff1ee197e43640f7581b478e591cfd0c07ef1aca 0.005000000000 272588 of 308584 -
01: 04301f4f75edf7f78bd7dd92834a9238607ad47638ee9d0d3aed6a22afdcd5fc 0.090000000000 253995 of 317822 -
02: 00f277a130f1e771b8155d246580af5c749366c54975e47f4615b3c8e3a7ddd6 0.300000000000 865444 of 976536 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-10 07:26:45 till 2016-09-08 15:42:36; resolution: 4.83 days)

  • |_*__*____________________________________________________________________________________________________________________________________________________________________*|
  • |__________________________________________*________________*_________________________________________________________________________*___________________________________*|

2 inputs(s) for total of 0.410000000000 xmr

key image 00: 46f078640470ad508741dc491dd72b18122055b37b73439d332fcdf026376083 amount: 0.010000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: fbde7bb615440239b8f1e54525ad7393c4d239559aa2c4e91a26688a1290cca6 00078836 1 10/117 2014-06-10 08:26:45 10:102:20:54:01
- 01: f12b89bbf9e8c5bac4f57e6829b36b7752d0a0ce07017a7a3415f45c31875c1f 00084950 1 14/131 2014-06-14 12:25:16 10:098:16:55:30
- 02: a6dd9ccf4663291a16583143bd682b086d161e19cea711023ec7fc5af12eed75 00102634 1 9/117 2014-06-26 15:57:19 10:086:13:23:27
- 03: 4e29996f04ae1b82b7c80ff3b848a0682b9e0d82b065ade6aaee8fe0bcbfe113 01131530 3 3/10 2016-09-08 14:42:36 08:011:14:38:10
key image 01: 64b8e518d61a3af65ba9d753f6c9aa69dd9bab60ec866517cd212c785ad3b33c amount: 0.400000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e4cff99a7da4fdd10d1417134204e299fc5314d6594340e6879598fe9151ffed 00365950 0 0/5 2014-12-27 11:50:51 09:267:17:29:55
- 01: 0a64ff857509d11b498009aa452564ac43ee2569e831c057a0754de4ea1402de 00482717 1 23/66 2015-03-19 05:00:51 09:186:00:19:55
- 02: e6d52d0c9d4de4211c8302ef00c3cec2e217db9a3734e84ae6238977403831e9 00997627 4 1/51 2016-03-15 02:13:03 08:189:03:07:43
- 03: 310344b79f0eaacdd195934c1a4fb7a259600125e6255c27d406a8b9203a73b2 01131530 3 3/10 2016-09-08 14:42:36 08:011:14:38:10
More details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-e06129bb4