Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: dd6f9d49e3bc9086059c98521d254c43c19c7c3bc6aaab11c5fed85ddfa1569f

Tx prefix hash: 2f5382737ddf6e910acac172357a30fae6c22889cd8fff067381aed285bd2ed6
Tx public key: 1c6ecf12823b7a56a313b1ebee4bd09de60f866f0ffb4b0f8e4e253d349c5179
Timestamp: 1424548058 Timestamp [UTC]: 2015-02-21 19:47:38 Age [y:d:h:m:s]: 09:336:16:07:31
Block: 446391 Fee (per_kB): 0.100000000000 (0.351890034364) Tx size: 0.2842 kB
Tx version: 1 No of confirmations: 2883755 RingCT/type: no
Extra: 011c6ecf12823b7a56a313b1ebee4bd09de60f866f0ffb4b0f8e4e253d349c5179

1 output(s) for total of 0.600000000000 xmr

stealth address amount amount idx tag
00: 1c1da15559a0a3164801fc2097ed96bdbc34dce62f858d7e55edbec4ee586402 0.600000000000 377669 of 650760 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-02-20 16:19:46 till 2015-02-21 04:03:55; resolution: 0.00 days)

  • |_______________*__________________________________________________________________________________________________________________________________________________________|
  • |___________________________________________________________________________________________________________________________________________________________*______________|

2 inputs(s) for total of 0.700000000000 xmr

key image 00: 5aa586193f560d37c9f839a2c8aabf3ca81b0b6fa357c3745d58a9d590e352bb amount: 0.200000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 2c66990e3dda9ec4fe973b12db0c094bccb08983efa040cae19036c1f7e50fd5 00444794 1 11/44 2015-02-20 17:19:46 09:337:18:35:23
key image 01: ef495ef4db0a03136bd174b9a11d61ed7379c47223021a0af571350e32598923 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 173d64aaa1edf69c27c981bf39728a7188085197f5cff1d876041df8eec15c25 00445310 1 18/60 2015-02-21 03:03:55 09:337:08:51:14
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 200000000000, "key_offsets": [ 791041 ], "k_image": "5aa586193f560d37c9f839a2c8aabf3ca81b0b6fa357c3745d58a9d590e352bb" } }, { "key": { "amount": 500000000000, "key_offsets": [ 660233 ], "k_image": "ef495ef4db0a03136bd174b9a11d61ed7379c47223021a0af571350e32598923" } } ], "vout": [ { "amount": 600000000000, "target": { "key": "1c1da15559a0a3164801fc2097ed96bdbc34dce62f858d7e55edbec4ee586402" } } ], "extra": [ 1, 28, 110, 207, 18, 130, 59, 122, 86, 163, 19, 177, 235, 238, 75, 208, 157, 230, 15, 134, 111, 15, 251, 75, 15, 142, 78, 37, 61, 52, 156, 81, 121 ], "signatures": [ "a3942b1892cea43f12b5de77379e18a4c0e8d7be92042dc03af677bc98b28a017d77e030314583f363d2b423392fe49254e33466330e153bce9e9ccc044fa20c", "357777f1d800c803ffd1da246990472bb6942e61ce4c66035b5150781b830d03e4682b0550877026c3f0d7408866c65b539b30b93b1a09a4653bd6d3a5e33d0a"] }


Less details
source code | explorer version (api): master-2023-03-28-d669720 (1.2) | monero version: 0.18.2.2-eac1b86bb