Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: 16ec2d0a9db51d25a3ac60184975714959dc6f45a6b09b3f088d706e38a27c3c

Tx prefix hash: 6b1f95246b7003472dd1c4434188bd12386a93db14a49b31bf192d39b3e3d990
Tx public key: 167aa5eee70be0a8f29788c513c4020c7713a1fa41c00e70ff82ccc4165d5989
Payment id: c79e9b223f1b042977bd1cf9b557df570029bb7f82857757917ee0fc46cefd5f
Timestamp: 1403487733 Timestamp [UTC]: 2014-06-23 01:42:13 Age [y:d:h:m:s]: 10:179:17:31:43
Block: 97486 Fee (per_kB): 0.005000000000 (0.015705521472) Tx size: 0.3184 kB
Tx version: 1 No of confirmations: 3206927 RingCT/type: no
Extra: 022100c79e9b223f1b042977bd1cf9b557df570029bb7f82857757917ee0fc46cefd5f01167aa5eee70be0a8f29788c513c4020c7713a1fa41c00e70ff82ccc4165d5989

1 output(s) for total of 90.000000000000 xmr

stealth address amount amount idx tag
00: 4fddf0bf461f13fa8739e894c456a1a8c4e70500602788d1a951aa022d597d12 90.000000000000 900 of 36286 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-22 05:08:27 till 2014-06-22 18:54:51; resolution: 0.00 days)

  • |_____________*____________________________________________________________________________________________________________________________________________________________|
  • |_____________________________________________________________________________________________________________________________________________________________*____________|

2 inputs(s) for total of 90.005000000000 xmr

key image 00: b7ae53cbe2cd9f84928f21a61ccaccd0f5a5dceabf6748c50c8c6a0f0b2fb13b amount: 0.005000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8217a06fdafb06a2d26940843ce3653fd6e8198819716ac9bc90d6346c03a0d7 00096241 1 16/4 2014-06-22 06:08:27 10:180:13:05:29
key image 01: c9fcd0b4aa4d3204fa8dfdde87b92ba4b98272961f213038bf471058cde70e3f amount: 90.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 939f0f3bbed30244f8958ec89cf897e4e4bdb7623fdc032a11e1040d4edb428e 00096977 1 15/8 2014-06-22 17:54:51 10:180:01:19:05
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000, "key_offsets": [ 169781 ], "k_image": "b7ae53cbe2cd9f84928f21a61ccaccd0f5a5dceabf6748c50c8c6a0f0b2fb13b" } }, { "key": { "amount": 90000000000000, "key_offsets": [ 888 ], "k_image": "c9fcd0b4aa4d3204fa8dfdde87b92ba4b98272961f213038bf471058cde70e3f" } } ], "vout": [ { "amount": 90000000000000, "target": { "key": "4fddf0bf461f13fa8739e894c456a1a8c4e70500602788d1a951aa022d597d12" } } ], "extra": [ 2, 33, 0, 199, 158, 155, 34, 63, 27, 4, 41, 119, 189, 28, 249, 181, 87, 223, 87, 0, 41, 187, 127, 130, 133, 119, 87, 145, 126, 224, 252, 70, 206, 253, 95, 1, 22, 122, 165, 238, 231, 11, 224, 168, 242, 151, 136, 197, 19, 196, 2, 12, 119, 19, 161, 250, 65, 192, 14, 112, 255, 130, 204, 196, 22, 93, 89, 137 ], "signatures": [ "d1661225519325aef0209b3ec86aad99a99a1aee23f003269d04d06eda518c057f6d247e95c16de8f35eb332132d34042078f900b4db56b5b4e5220db8e51307", "b10e4fef9fff5f9283c073d699f2b7734908c7b848105f77d21c9fbbc04abb021ccb2c7603e05acc51c8e0613acea5f1ff1273b2f3bbd577aee8c095e028c108"] }


Less details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-eac1b86bb