Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: fbe3c4449c981632a97e04f4a8db0397777fa56703ef2247f07e4073c624fbbe

Tx prefix hash: ed5c1228cd822b24c271a0e4eb92ae02bfd7a793747ac5104bea9fdb4b43179f
Tx public key: a31ebab95b95e6c9e1c1a35bd3023b0554830c57b00d0440fa6dd5058946e5d1
Payment id: a7d0a71be548d12872275c54442366e7acfc5f5a5ee37f824e5e2249e0fd46b7
Timestamp: 1403957078 Timestamp [UTC]: 2014-06-28 12:04:38 Age [y:d:h:m:s]: 10:135:20:14:50
Block: 105250 Fee (per_kB): 0.005400000000 (0.017172670807) Tx size: 0.3145 kB
Tx version: 1 No of confirmations: 3171514 RingCT/type: no
Extra: 022100a7d0a71be548d12872275c54442366e7acfc5f5a5ee37f824e5e2249e0fd46b701a31ebab95b95e6c9e1c1a35bd3023b0554830c57b00d0440fa6dd5058946e5d1

1 output(s) for total of 0.001000000000 xmr

stealth address amount amount idx tag
00: 997a2feffae20d952df26ec9e0418ec21730dddce1446c88bee0afd4331a7724 0.001000000000 43652 of 100400 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-17 14:50:23 till 2014-06-28 11:59:26; resolution: 0.25 days)

  • |_*________________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 0.006400000000 xmr

key image 00: 52d2238aabdeee56535d5af83260b380e12578ef7bf4f689240cfb7079a617ad amount: 0.000400000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6740b5e143767b16d9a09a1b54ef06a801379b775ebcd59df960cb2055827c1e 00044143 1 8/419 2014-05-17 15:50:23 10:177:16:29:05
key image 01: 97dec065f7a71039435334dd307e557a7201a89297fa21157f57273310a3d31b amount: 0.006000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5f3fb69d1997bd3eb8277dc910a4b19ff09713fc6d71a08680c6191af3ec8014 00105185 1 2/2 2014-06-28 10:59:26 10:135:21:20:02
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 400000000, "key_offsets": [ 4612 ], "k_image": "52d2238aabdeee56535d5af83260b380e12578ef7bf4f689240cfb7079a617ad" } }, { "key": { "amount": 6000000000, "key_offsets": [ 166382 ], "k_image": "97dec065f7a71039435334dd307e557a7201a89297fa21157f57273310a3d31b" } } ], "vout": [ { "amount": 1000000000, "target": { "key": "997a2feffae20d952df26ec9e0418ec21730dddce1446c88bee0afd4331a7724" } } ], "extra": [ 2, 33, 0, 167, 208, 167, 27, 229, 72, 209, 40, 114, 39, 92, 84, 68, 35, 102, 231, 172, 252, 95, 90, 94, 227, 127, 130, 78, 94, 34, 73, 224, 253, 70, 183, 1, 163, 30, 186, 185, 91, 149, 230, 201, 225, 193, 163, 91, 211, 2, 59, 5, 84, 131, 12, 87, 176, 13, 4, 64, 250, 109, 213, 5, 137, 70, 229, 209 ], "signatures": [ "9308c7cf2e8812fd1d5793e450612c4c46fdfa38c8fd8e4fab24de00ca50f004d00158e3146e4fda82eefaf9589b380cc71eb4a6f1e2e3358a0e93c4cbdc8602", "abd72fb21bccbd4225e58cbc63d29990a22526e1322127acd79e0822f619790ca0be0e9f6c30fa329b0339e72caa8b7aa7e4f3df57b4316780b952efa6749a02"] }


Less details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-e06129bb4