Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: caa85687ab81c804d3d5a65775aa4d5f63f0c749d229d8350cabdf1ccc08dc4c

Tx prefix hash: f977b29617d3913fe6e6c83abf9711884c79918612669d6e265847b029fe539a
Tx public key: 26699a5c5a7a313dab2f695f4874152af44440de7a371641655a4856bbec0ba4
Timestamp: 1426278671 Timestamp [UTC]: 2015-03-13 20:31:11 Age [y:d:h:m:s]: 09:280:07:16:50
Block: 475109 Fee (per_kB): 0.100000000000 (0.351890034364) Tx size: 0.2842 kB
Tx version: 1 No of confirmations: 2828785 RingCT/type: no
Extra: 0126699a5c5a7a313dab2f695f4874152af44440de7a371641655a4856bbec0ba4

1 output(s) for total of 1.000000000000 xmr

stealth address amount amount idx tag
00: 3def7c958c03de3e16e07f6d2364262982a6df5838ce26ed145381d4413c0a5c 1.000000000000 492087 of 874630 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-03-13 09:48:23 till 2015-03-13 13:49:33; resolution: 0.00 days)

  • |_______________________________________________________________________________________________________________________________*__________________________________________|
  • |___________________________________________*______________________________________________________________________________________________________________________________|

2 inputs(s) for total of 1.100000000000 xmr

key image 00: cb78e849210c23d68ab9f94c251b764a76528f88d0c640349c6a6231fb1b4e0c amount: 0.600000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: cad187abf7d98fc65c209cab007afc4ab3a9e5fb10f6807e31a90cb07c000cb0 00474639 1 14/40 2015-03-13 12:49:33 09:280:14:58:28
key image 01: 16b2ed61371a50a59de2eb92b0b9a31ba6eaf265d4779c6ebf9ad154c9c98c3b amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 66659a74f23f972c5be12b99876ad737c3806262b98af973605398a2a458d8bd 00474505 1 3/30 2015-03-13 10:48:23 09:280:16:59:38
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 600000000000, "key_offsets": [ 388677 ], "k_image": "cb78e849210c23d68ab9f94c251b764a76528f88d0c640349c6a6231fb1b4e0c" } }, { "key": { "amount": 500000000000, "key_offsets": [ 690821 ], "k_image": "16b2ed61371a50a59de2eb92b0b9a31ba6eaf265d4779c6ebf9ad154c9c98c3b" } } ], "vout": [ { "amount": 1000000000000, "target": { "key": "3def7c958c03de3e16e07f6d2364262982a6df5838ce26ed145381d4413c0a5c" } } ], "extra": [ 1, 38, 105, 154, 92, 90, 122, 49, 61, 171, 47, 105, 95, 72, 116, 21, 42, 244, 68, 64, 222, 122, 55, 22, 65, 101, 90, 72, 86, 187, 236, 11, 164 ], "signatures": [ "786e73dd51d06fa6015298573687149d19f43b9fdab3719cc80c1504304f280ae0a1842ef4628f4401236930ab81e1c431d2ab259a47514d3eef922a10106c09", "c84f525f9e07d0c509ca2b6cc39648fdcf1f036a1818b3f150558db36728e80b464dd310bd7a52abfc1f2b2c6337b91632131dff85c8ca840ccf3f8da2f08e09"] }


Less details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-eac1b86bb