Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: 1ee13565153b0b0b7149996d7b74956db8f6df0bb0aa2cae5e1f9dc5484a1038

Tx prefix hash: 4f883f39ebedadddc84e5e0d0f693d7eeb43c2cf3857ee89318cffde29a2bdf8
Tx public key: c53f981b302a92f089a2dded2727ae291753b137c74d7569458597a0fd9ddc74
Timestamp: 1422263250 Timestamp [UTC]: 2015-01-26 09:07:30 Age [y:d:h:m:s]: 09:326:01:20:19
Block: 408498 Fee (per_kB): 0.100000000000 (0.351890034364) Tx size: 0.2842 kB
Tx version: 1 No of confirmations: 2894926 RingCT/type: no
Extra: 01c53f981b302a92f089a2dded2727ae291753b137c74d7569458597a0fd9ddc74

1 output(s) for total of 1.000000000000 xmr

stealth address amount amount idx tag
00: b61bbf54bbe74cb5aedc647c58f0b8cdda2a665c2ddab814150bcd017136fdd8 1.000000000000 397812 of 874630 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-01-25 11:25:09 till 2015-01-26 02:16:39; resolution: 0.00 days)

  • |______________________________________________________________________________________________________________________________________________________________*___________|
  • |____________*_____________________________________________________________________________________________________________________________________________________________|

2 inputs(s) for total of 1.100000000000 xmr

key image 00: 635dffb80c4c4082e67a387c4e82d595737baf5281863d22587d21def86a269e amount: 0.600000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f681ffa683daf4fd4c9db7f9a877b499a0e32e8d771c53c7431c475f0ab73708 00408016 1 13/51 2015-01-26 01:16:39 09:326:09:11:10
key image 01: 41fee63c73165fe7a8cc2daa7249a1d67157fbe91a4f5d0e3ca57140f59859a2 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 91c93f0529bd383ea297d93e18a58df97b3b79d3cfb93f75cc0811fc21583712 00407297 1 50/107 2015-01-25 12:25:09 09:326:22:02:40
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 600000000000, "key_offsets": [ 350006 ], "k_image": "635dffb80c4c4082e67a387c4e82d595737baf5281863d22587d21def86a269e" } }, { "key": { "amount": 500000000000, "key_offsets": [ 608442 ], "k_image": "41fee63c73165fe7a8cc2daa7249a1d67157fbe91a4f5d0e3ca57140f59859a2" } } ], "vout": [ { "amount": 1000000000000, "target": { "key": "b61bbf54bbe74cb5aedc647c58f0b8cdda2a665c2ddab814150bcd017136fdd8" } } ], "extra": [ 1, 197, 63, 152, 27, 48, 42, 146, 240, 137, 162, 221, 237, 39, 39, 174, 41, 23, 83, 177, 55, 199, 77, 117, 105, 69, 133, 151, 160, 253, 157, 220, 116 ], "signatures": [ "c2d01ae828c7daa014641673361cf3d1b8edde743dbc58c6b248174984e4dd021c4095953d2a1e967abf09ffc034e400006ef1c5ed809402927ecbc730a4d40f", "5afab1ef9a59910774bb52a67a4341aa14e2e1bd3f0beec1d83e9c9fbe4dc50442942dc26cc4640cc767ca44b14764bdb6a69254a7aac37ba55a2682a9b9100c"] }


Less details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-eac1b86bb