Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: 38c04ddce4f992059ed6e12077e0a7010612d5c5fd438caaca7ab3525622ef9d

Tx prefix hash: a188b4abd6d86baba69367e6a1f9088332de86d62cabb53ee507de7ddbc91ab7
Tx public key: b8ff3b4916c7749c56a41e353b49aeddb03961ad1a449a9b4cfde36cbef7a605
Timestamp: 1424547930 Timestamp [UTC]: 2015-02-21 19:45:30 Age [y:d:h:m:s]: 09:300:12:51:46
Block: 446390 Fee (per_kB): 0.100000000000 (0.351890034364) Tx size: 0.2842 kB
Tx version: 1 No of confirmations: 2857674 RingCT/type: no
Extra: 01b8ff3b4916c7749c56a41e353b49aeddb03961ad1a449a9b4cfde36cbef7a605

1 output(s) for total of 0.300000000000 xmr

stealth address amount amount idx tag
00: 15bad1f4afe8a4ca95fe935796d3f3939f8a9fcecb8a617c494b77e69400319e 0.300000000000 458152 of 976536 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-02-20 17:12:37 till 2015-02-21 13:47:20; resolution: 0.01 days)

  • |_________*________________________________________________________________________________________________________________________________________________________________|
  • |_________________________________________________________________________________________________________________________________________________________________*________|

2 inputs(s) for total of 0.400000000000 xmr

key image 00: 17faa67bf5e2dcc8226f1f1c9541e5d1637a16c51510f0fc3a41945ea0e655fb amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 337c8059d78b648d71c7e11539753663747ccc1a1230df5d6acc0d313ff700ad 00444851 1 10/51 2015-02-20 18:12:37 09:301:14:24:39
key image 01: e7295588839a4a924e5e5b1a43f48cf161f2e9c837e713b56389121461bec455 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9de54d4fc3bdcaf14d70e8144752daee7552c59e81fabf85a35a93f78e5f1436 00445962 1 3/50 2015-02-21 12:47:20 09:300:19:49:56
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 200000000000, "key_offsets": [ 791058 ], "k_image": "17faa67bf5e2dcc8226f1f1c9541e5d1637a16c51510f0fc3a41945ea0e655fb" } }, { "key": { "amount": 200000000000, "key_offsets": [ 792176 ], "k_image": "e7295588839a4a924e5e5b1a43f48cf161f2e9c837e713b56389121461bec455" } } ], "vout": [ { "amount": 300000000000, "target": { "key": "15bad1f4afe8a4ca95fe935796d3f3939f8a9fcecb8a617c494b77e69400319e" } } ], "extra": [ 1, 184, 255, 59, 73, 22, 199, 116, 156, 86, 164, 30, 53, 59, 73, 174, 221, 176, 57, 97, 173, 26, 68, 154, 155, 76, 253, 227, 108, 190, 247, 166, 5 ], "signatures": [ "220618eef8fe3d8efb12306f29e0c0d0cc183dc19d83a0d7ce49410c4b256a017ccef6534311c91c2833daa73915fbd06e7ff56c8a675a262a329f3ed0c6e109", "f2101251c1b1c9a52b4d90e69ba8e366252e17901c67c6b49fa47d0a95315b0716f8cec8d70defc0539797b6069d8f0f4bb0b3a9a8e639ad16a38c5cc9e48d0c"] }


Less details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-eac1b86bb