Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: d0d858400a1755c8c2d4f56d48456e39c875dd01a78b8a6537bc78a117e4703a

Tx prefix hash: 9ca80f4e935bb29e212bdd7ec5c6299b0019752c1699c5554cd1697d740fc137
Tx public key: 22b9507625a52ec3c0e3bb8e06ca97755524a41cc94d3e337c8ade7b8f9ecd28
Timestamp: 1419286372 Timestamp [UTC]: 2014-12-22 22:12:52 Age [y:d:h:m:s]: 09:362:02:24:39
Block: 359376 Fee (per_kB): 0.100000000000 (0.351890034364) Tx size: 0.2842 kB
Tx version: 1 No of confirmations: 2945200 RingCT/type: no
Extra: 0122b9507625a52ec3c0e3bb8e06ca97755524a41cc94d3e337c8ade7b8f9ecd28

1 output(s) for total of 0.500000000000 xmr

stealth address amount amount idx tag
00: 9a9fab0ce5c1346e7e5f2f27abff53d02e938b6c27f1b2989aebfb38339ecf7d 0.500000000000 541721 of 1118624 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-12-22 09:22:51 till 2014-12-22 12:23:25; resolution: 0.00 days)

  • |_________________________________________________________________________________________________________________*________________________________________________________|
  • |_________________________________________________________*________________________________________________________________________________________________________________|

2 inputs(s) for total of 0.600000000000 xmr

key image 00: 33ec37f5c0c86b8d1e8e5ce9d331d14f962671049e130c0ece651717a516e743 amount: 0.300000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 67c6939d9225d923adc051fc63ba71169eb2312c2c73aaa34faa5baa06c5f688 00358690 1 8/51 2014-12-22 11:23:25 09:362:13:14:06
key image 01: 9313f33f5e7500a95922ada5c761989754625981377f031ba3c670357ae7a1e5 amount: 0.300000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 65eeca302c35dd9ea59fec9c42b86af487146269ece2e95a7a00cee6f37b1b41 00358607 1 8/50 2014-12-22 10:22:51 09:362:14:14:40
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 300000000000, "key_offsets": [ 386052 ], "k_image": "33ec37f5c0c86b8d1e8e5ce9d331d14f962671049e130c0ece651717a516e743" } }, { "key": { "amount": 300000000000, "key_offsets": [ 385968 ], "k_image": "9313f33f5e7500a95922ada5c761989754625981377f031ba3c670357ae7a1e5" } } ], "vout": [ { "amount": 500000000000, "target": { "key": "9a9fab0ce5c1346e7e5f2f27abff53d02e938b6c27f1b2989aebfb38339ecf7d" } } ], "extra": [ 1, 34, 185, 80, 118, 37, 165, 46, 195, 192, 227, 187, 142, 6, 202, 151, 117, 85, 36, 164, 28, 201, 77, 62, 51, 124, 138, 222, 123, 143, 158, 205, 40 ], "signatures": [ "97ac74662b72212f306d81f4004a644c59f015f4081c172179803ca196cf160773667b89903f0d10070d6d5b3f5852d6d3179ecf4c04c018080519d4aadf290a", "2ac83ee0a426f9c3bf7476f85cb4c7a2de6324d34d02db8c75581263793dcb0227bfa15c4bcd1e0015da26f9e25b8380d8d4a056b0b23666aa13e120f4453707"] }


Less details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-eac1b86bb