Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: 6e292b76b223b0a906e6933b85d19c98076edee2c398d45d88221a761ae28d33

Tx prefix hash: 186c405e51e77b8b56d1a332635c572143eab3bba1492d4795498c058162f6a4
Tx public key: 07b45ef5ec3f0c9f78025194f4c0cf92f021988ac76f53f9deb8b9dfe58c6018
Timestamp: 1419606768 Timestamp [UTC]: 2014-12-26 15:12:48 Age [y:d:h:m:s]: 09:358:18:54:38
Block: 364691 Fee (per_kB): 0.100000000000 (0.351890034364) Tx size: 0.2842 kB
Tx version: 1 No of confirmations: 2940164 RingCT/type: no
Extra: 0107b45ef5ec3f0c9f78025194f4c0cf92f021988ac76f53f9deb8b9dfe58c6018

1 output(s) for total of 0.800000000000 xmr

stealth address amount amount idx tag
00: 871353827db6bceefaccff37dbadfef321279cab57f42334c534c30bc4a4cd3d 0.800000000000 225996 of 489955 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-12-26 08:43:39 till 2014-12-26 11:45:37; resolution: 0.00 days)

  • |________________________________________________________*_________________________________________________________________________________________________________________|
  • |__________________________________________________________________________________________________________________*_______________________________________________________|

2 inputs(s) for total of 0.900000000000 xmr

key image 00: b3bd7d02685cc6dbf535d59dd166b17934a5df707697264cddfb65ffbfcd2cf9 amount: 0.400000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: debd4ff219ffc8bf007c152f978ee9e28ea26883c8baeebf342344db8350bfed 00364264 1 15/45 2014-12-26 09:43:39 09:359:00:23:47
key image 01: ef77a5f4375bfd444d23a923a5caef54024569eb88decd54b366afc685dd584a amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0c8dd93dfefd54b1c09a0b7b65ef7c1b4cb5d0a5b40aa33982646d1c023bc5cf 00364352 1 7/53 2014-12-26 10:45:37 09:358:23:21:49
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 400000000000, "key_offsets": [ 313509 ], "k_image": "b3bd7d02685cc6dbf535d59dd166b17934a5df707697264cddfb65ffbfcd2cf9" } }, { "key": { "amount": 500000000000, "key_offsets": [ 550232 ], "k_image": "ef77a5f4375bfd444d23a923a5caef54024569eb88decd54b366afc685dd584a" } } ], "vout": [ { "amount": 800000000000, "target": { "key": "871353827db6bceefaccff37dbadfef321279cab57f42334c534c30bc4a4cd3d" } } ], "extra": [ 1, 7, 180, 94, 245, 236, 63, 12, 159, 120, 2, 81, 148, 244, 192, 207, 146, 240, 33, 152, 138, 199, 111, 83, 249, 222, 184, 185, 223, 229, 140, 96, 24 ], "signatures": [ "9ae348c211191359bfffb00e8c873981fea35803d2e2a8524f5db2e6d05de50cfbd9faf983aa833ab25cd459cc0d20ef8470a002f233a2f48127813d26d72505", "3a721f8c022b92bde1a4b00b1705c387197f530036ac7d75b008532e5161360a5bef92f89a3e21626dacf011b5a28915a4e29b5eee15a521e8e2f75fd5be960a"] }


Less details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-eac1b86bb