Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: 7f52822187439b74ce88cffc1fd33228165eccb25349fa0b3020684b7a54791f

Tx prefix hash: 82a332a779c11df1d503a0ffab1df789403a4987c9583e6e4096612b4814c405
Tx public key: 2b2f3566e4680f4f0a5306cd525200e3378de392e6f76d69e392255890aa6f4e
Timestamp: 1424424246 Timestamp [UTC]: 2015-02-20 09:24:06 Age [y:d:h:m:s]: 09:302:10:40:08
Block: 444300 Fee (per_kB): 0.100000000000 (0.351890034364) Tx size: 0.2842 kB
Tx version: 1 No of confirmations: 2860146 RingCT/type: no
Extra: 012b2f3566e4680f4f0a5306cd525200e3378de392e6f76d69e392255890aa6f4e

1 output(s) for total of 0.300000000000 xmr

stealth address amount amount idx tag
00: c03e3a0cf3f87abc3e1d44a4c9572f9899f9db43b02a72cc7cf73aa55ff5b4f1 0.300000000000 456808 of 976536 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-02-19 00:48:42 till 2015-02-19 13:32:43; resolution: 0.00 days)

  • |____________________________________________________________________________________________________________________________________________________________*_____________|
  • |______________*___________________________________________________________________________________________________________________________________________________________|

2 inputs(s) for total of 0.400000000000 xmr

key image 00: a654178f8ffd060e38dd67488787dc95fbeba45f4356ba52a8f2c81bd0142cf2 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4211f6499dd84dce00653f76ecc02723d655fc7418e8f8b3d73b94efd45395e4 00443065 1 6/56 2015-02-19 12:32:43 09:303:07:31:31
key image 01: 7e29763f2d2f44379c9036282a694e946fda1fd6924d76de6b79990369e840c0 amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1fa19680ecf624f7bd2f988e527c3e126a4c4f7071972ce2fd7b9b1d678fdc1a 00442385 1 11/51 2015-02-19 01:48:42 09:303:18:15:32
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 200000000000, "key_offsets": [ 789263 ], "k_image": "a654178f8ffd060e38dd67488787dc95fbeba45f4356ba52a8f2c81bd0142cf2" } }, { "key": { "amount": 200000000000, "key_offsets": [ 788522 ], "k_image": "7e29763f2d2f44379c9036282a694e946fda1fd6924d76de6b79990369e840c0" } } ], "vout": [ { "amount": 300000000000, "target": { "key": "c03e3a0cf3f87abc3e1d44a4c9572f9899f9db43b02a72cc7cf73aa55ff5b4f1" } } ], "extra": [ 1, 43, 47, 53, 102, 228, 104, 15, 79, 10, 83, 6, 205, 82, 82, 0, 227, 55, 141, 227, 146, 230, 247, 109, 105, 227, 146, 37, 88, 144, 170, 111, 78 ], "signatures": [ "7e2cc8d8b314b0ea671b61e31bc2de29b51cba22dd3634266043ad6994ffa90c1a4c54e9469c109937bf728dd3ed50786fe0d50dcc8415ee21c6d83002735e0b", "1a0f174dfe2e36b541c5ed781e42871b11160db6770c34b3cbebbd5c7461e00589ed53f1618e84a06cc9b60128a40c7b8d2fb837c3c9b104e2e9802c05dbd306"] }


Less details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-eac1b86bb