Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: 0ca5090d1c763a94c7e4297368989c3601141bc311cf2e31133bb5dfc4c7572a

Tx prefix hash: 12fb61de0ceb92e37bc92660b21c997e9b93807dfbe1d63265f2d07e3a2ede33
Tx public key: b2abdd18c96a74f1ccc19d1316d846d0e356b4188b097b9f3a8b7a6ced6e7324
Timestamp: 1421845936 Timestamp [UTC]: 2015-01-21 13:12:16 Age [y:d:h:m:s]: 09:331:22:21:08
Block: 401638 Fee (per_kB): 0.100000000000 (0.351890034364) Tx size: 0.2842 kB
Tx version: 1 No of confirmations: 2902524 RingCT/type: no
Extra: 01b2abdd18c96a74f1ccc19d1316d846d0e356b4188b097b9f3a8b7a6ced6e7324

1 output(s) for total of 0.300000000000 xmr

stealth address amount amount idx tag
00: a747054c824ecc495b6fc56b3de8df8246f64761086e223ace488e35300a0767 0.300000000000 426902 of 976536 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-01-20 18:20:32 till 2015-01-21 07:44:20; resolution: 0.00 days)

  • |_____________________________________________________________________________________________________________________________________________________________*____________|
  • |_____________*____________________________________________________________________________________________________________________________________________________________|

2 inputs(s) for total of 0.400000000000 xmr

key image 00: 58fb2df38b525977ec91977583cc2c660ebb23a87e0abe05d9a4e4818ace037e amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3d7337c3b1d7571a564877993ca1754d361f3cf5def1db3e3b036309d58ffa78 00401169 1 3/51 2015-01-21 06:44:20 09:332:04:49:04
key image 01: 5fc68a83eb5005601caa0651ac9f236c6c171bcf301136b07cbee985ff99ca01 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: aefba53cc25f45ac97ef253b0aa574861a168f5f3ab10279bbeba228cb32df3a 00400541 1 3/50 2015-01-20 19:20:32 09:332:16:12:52
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 200000000000, "key_offsets": [ 747365 ], "k_image": "58fb2df38b525977ec91977583cc2c660ebb23a87e0abe05d9a4e4818ace037e" } }, { "key": { "amount": 200000000000, "key_offsets": [ 746568 ], "k_image": "5fc68a83eb5005601caa0651ac9f236c6c171bcf301136b07cbee985ff99ca01" } } ], "vout": [ { "amount": 300000000000, "target": { "key": "a747054c824ecc495b6fc56b3de8df8246f64761086e223ace488e35300a0767" } } ], "extra": [ 1, 178, 171, 221, 24, 201, 106, 116, 241, 204, 193, 157, 19, 22, 216, 70, 208, 227, 86, 180, 24, 139, 9, 123, 159, 58, 139, 122, 108, 237, 110, 115, 36 ], "signatures": [ "34ae32a5ab16d68e7937c01c32f3d539e399d61cd51b5f775745cfe3e980dc0f0102c2ee2456ff8656267e9b80a19439ca9d4f287baf0e90935f6aea1f3daa00", "bd8e1037cee00e2b10861840cffe2c8becedaeebea6f1333aa8f65d70409410f59f015fde4561ab37765294e5b270bf5ca4cf2756c5f5f5ba34f8cc28b844d00"] }


Less details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-eac1b86bb