xmrchain.net & Explore.Moneroworld.com

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Solo mine on your own blockchain to support the monero network!

Monero Website || Make Monero Better!

~~~~Monero Bounties~~~~

Monero Testnet Explorer || Monero Stagenet Explorer

i2p links: exchanged.i2p

Why so ugly? Monero FAQ

Moneroblocks Explorer || Monerohash explorer || Map of Monero Network

For a pretty version of this explorer with javascript. NOTE - this doesn't work when I turn the API off. I AM IN CONTROL OF THE DRUM MACHINE.

Don't use the API

NOTE: This explorer actively tests beta software in production. If it crashes, hooray! We found a bug! Please find a backup explorer for these instances.

The most up to date software for Monero are version: CLI v0.18.4.0, GUI v0.18.4.0

If you need to use a remote node, you should set up your own.

High Fee Bug. Remote nodes can increase your tx fees. Double check before sending. Run your own node.

Autorefresh is OFF

Tx hash: 14eb2f510adc3ad6846c83584f88730f368ccc3dcb75abdc23c72bee83efcad8

Tx public key: e5ccd756227fe7f69f12475464ebcac78cdb4728f6259cdd114aa669b7eadb8e
Timestamp: 1456536462 Timestamp [UTC]: 2016-02-27 01:27:42 Age [y:d:h:m:s]: 09:164:07:24:51
Block: 973541 Fee (per_kB): 0.029220111875 (0.033847731403) Tx size: 0.8633 kB
Tx version: 1 No of confirmations: 2498996 RingCT/type: no
Extra: 01e5ccd756227fe7f69f12475464ebcac78cdb4728f6259cdd114aa669b7eadb8e

11 output(s) for total of 13.873368170000 xmr

stealth address amount amount idx tag
00: 41bfa4c9d355d2f531974b96b5e4196566e7edfe956eb4f716a8f87de3e9ad96 0.000000070000 626 of 22273 -
01: 85786a6cfd1f58fb085cf4060404534bb24e6f83d73936bed6139498f80d309d 0.000000100000 630 of 22829 -
02: 945ccfde684c3144f71372503612aae8adfec6f372c67d219d8d7d41971f9f56 0.000008000000 20038 of 42743 -
03: ece4ff1b49ccd08bfc5b4d83b8667392be17a912b981f31ac4e7dbdbce43b088 0.000060000000 35772 of 59217 -
04: 474a8259d3f5464919fb13e1d30b90b2f1eda9419c1bd1649f8b737675ae0ad2 0.000300000000 36829 of 78258 -
05: 44adae63036a66ce982d32d434e7a98d11d270aaa8607cdcbfe9d4e5d44f6e52 0.003000000000 40134 of 90179 -
06: c3aaeb8e2a88d9e53c82aebb487774e4dded3946a1e15a7f030711e3f9418b53 0.070000000000 188636 of 263948 -
07: 32ad96ef76648efcbcdcd2d30985b9f12055a1e5bab898fa7f54198bff35b7dd 0.900000000000 339706 of 454894 -
08: 0c1d35acbc11c266d543cc58071dae2f806d1c5945b111f3293967d5ec844f6f 0.900000000000 339707 of 454894 -
09: d78278f543aa1a20b8a095e7dfc58f1b455b2f56e6766af8d765d4139bbd88d5 6.000000000000 135067 of 207703 -
10: b2fbfb18c9d84c2ec944c3be497441693c43d2f61a48b61103e9377f6d9a0a62 6.000000000000 135068 of 207703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



4 inputs(s) for total of 13.902588281875 xmr

key image 00: 829483958ba7fd43c51d934a3a0b710dfce0380743a5ee7938fe5756226e5c7f amount: 0.002588281875
ring members blk
- 00: edadf7e28a0b545d7ac46eac956ad229d2c296c105b39dc9ffcf1531fa81e238 00829986
key image 01: 02587c22b07ee578e9c9fc15c97f7bfa2db477040379e008c7b8a1ca5454a672 amount: 0.900000000000
ring members blk
- 00: c8480422aa5e7cdccb8afa970b5ef5509fd570c311600b94b98fc4f35fe49e51 00970737
key image 02: b12c4c4aeac7e749743d399ae2db6c222dbcf5ead4b67d7b83eb8a53834ae80b amount: 6.000000000000
ring members blk
- 00: e924a395a81e93b868640c109c31d1d362df0c2d21516b4cece03846a9110cac 00971737
key image 03: a5bfd3b4fd29d4e56092410712781b124bf13d8d2dda7d35f9c334e2de1549c2 amount: 7.000000000000
ring members blk
- 00: e738f373574a6c361e817227aeee89de11fa446cbe87759583e1e66cbccb8cca 00967244
More details
source code | explorer version (api): devel-2024-08-14-0c4ec39 (1.2)