Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: d38b8b068c34285a96cdd75c0c62c52e2d58e4ed275eaa49004a6ae51567da3a

Tx prefix hash: ed78fa1bd9012b8cd17b741636816610b2de66ea979be3d4f0a98f453bb10a4e
Tx public key: 3c5bf3d8c247ca5e02ac50da86f0a5044241a0c342b8d8cf15dfc106bd769201
Timestamp: 1423838278 Timestamp [UTC]: 2015-02-13 14:37:58 Age [y:d:h:m:s]: 09:268:09:45:36
Block: 434625 Fee (per_kB): 0.100000000000 (0.351890034364) Tx size: 0.2842 kB
Tx version: 1 No of confirmations: 2840430 RingCT/type: no
Extra: 013c5bf3d8c247ca5e02ac50da86f0a5044241a0c342b8d8cf15dfc106bd769201

1 output(s) for total of 0.300000000000 xmr

stealth address amount amount idx tag
00: 09e6b40224ef57fbbbfb7135311af20fb44bb98f77ab30bc965ce22c4e41bc91 0.300000000000 450427 of 976536 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-02-12 09:33:25 till 2015-02-13 03:00:24; resolution: 0.00 days)

  • |________________________________________________________________________________________________________________________________________________________________*_________|
  • |__________*_______________________________________________________________________________________________________________________________________________________________|

2 inputs(s) for total of 0.400000000000 xmr

key image 00: 12a91a993b5f883cc4386ffdf95e330f975885d017599f2f1f27bf608026b77d amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9613e7ebaa74d0b89079b9621689cf6047f243309633260b6f6df6e6c9a08640 00433815 1 14/55 2015-02-13 02:00:24 09:268:22:23:10
key image 01: c6d3db08cafaa4f91e16d9e150aa5d9bc046d13d2e5a5f347903a6b6b703297d amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1395445eba8523a04fbe3203b5529fc3dac46c9d6c88388d7e72435f225f8c61 00432936 1 9/55 2015-02-12 10:33:25 09:269:13:50:09
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 200000000000, "key_offsets": [ 780228 ], "k_image": "12a91a993b5f883cc4386ffdf95e330f975885d017599f2f1f27bf608026b77d" } }, { "key": { "amount": 200000000000, "key_offsets": [ 779304 ], "k_image": "c6d3db08cafaa4f91e16d9e150aa5d9bc046d13d2e5a5f347903a6b6b703297d" } } ], "vout": [ { "amount": 300000000000, "target": { "key": "09e6b40224ef57fbbbfb7135311af20fb44bb98f77ab30bc965ce22c4e41bc91" } } ], "extra": [ 1, 60, 91, 243, 216, 194, 71, 202, 94, 2, 172, 80, 218, 134, 240, 165, 4, 66, 65, 160, 195, 66, 184, 216, 207, 21, 223, 193, 6, 189, 118, 146, 1 ], "signatures": [ "f04017526815810328d59deb669ebd76886911e414402cb929e1599b9a4cfa0aa50d4005efeb950954fedbf5219962970ede2221dc525c9fa0277a7a1c606f02", "8bfa1dba0384fcaa9b158b8726fefc65a4f49c7f96500140128daf0325d28904ffb3e0c6ca2f4f7da4b9d341e8379090fbad1edbe7968fac519823cbdad5ee07"] }


Less details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-e06129bb4