xmrchain.net & Explore.Moneroworld.com

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Solo mine on your own blockchain to support the monero network!

Monero Website || Make Monero Better!

~~~~Monero Bounties~~~~

Monero Testnet Explorer || Monero Stagenet Explorer

i2p links: exchanged.i2p

Why so ugly? Monero FAQ

Moneroblocks Explorer || Monerohash explorer || Map of Monero Network

For a pretty version of this explorer with javascript. NOTE - this doesn't work when I turn the API off. I AM IN CONTROL OF THE DRUM MACHINE.

Don't use the API

NOTE: This explorer actively tests beta software in production. If it crashes, hooray! We found a bug! Please find a backup explorer for these instances.

The most up to date software for Monero are version: CLI v0.18.4.0, GUI v0.18.4.0

If you need to use a remote node, you should set up your own.

High Fee Bug. Remote nodes can increase your tx fees. Double check before sending. Run your own node.

Autorefresh is OFF

Tx hash: 91762046f8775b3997f029d470ca89d7aa4824819677779c85163b2b8b4afd9e

Tx public key: 93f18e8d6d24e466895867aafd27e03f6c2e797d7847bdfdd7e1d05921cd49ae
Timestamp: 1483623811 Timestamp [UTC]: 2017-01-05 13:43:31 Age [y:d:h:m:s]: 08:218:05:16:49
Block: 1217148 Fee (per_kB): 0.010000000000 (0.010556701031) Tx size: 0.9473 kB
Tx version: 1 No of confirmations: 2257145 RingCT/type: no
Extra: 0193f18e8d6d24e466895867aafd27e03f6c2e797d7847bdfdd7e1d05921cd49aede207f33b66fbbbf860389bd5260530014f7a17c82228d42b76199dbc18860048194

11 output(s) for total of 0.410000000000 xmr

stealth address amount amount idx tag
00: 6a92b59cb52f0f4a1aa6da5e7a84e91c13d40e4c6d57f7daa3234941d69e3489 0.000003000000 38481 of 42343 -
01: 4f6130836e3e2c1206ef11a4096f034ad4dc1a2a8ca6fa5f32638b5fc5c90308 0.000007000000 37448 of 41476 -
02: effb0e27059a032eaee1d37ecd060cc650b6c9f828db5708d93744024967c97c 0.000030000000 55524 of 59487 -
03: 52e87bd6228f85f930ea3088895337f7b3724b0cd8729a3215ab5930217043df 0.000060000000 55221 of 59217 -
04: 751843b5397a78e806950d50afaedf45e8b8102d4492bfba18f60ab77c5cdec5 0.000300000000 73743 of 78258 -
05: 1671b37c082268950a337aa93b13f637d1dff336b0611c6992fbbcee4467b49e 0.000600000000 73376 of 77844 -
06: 27c4c6eadb80c243685dc877b5b0b72fb717a80db63b68470e205ae208ab8a8c 0.009000000000 227342 of 233399 -
07: acbcce26bdeb2878863e0d01d64f71d93d6820bf0fe4f76d50b9d2aa9e5eab0a 0.010000000000 493398 of 502468 -
08: 8bbeefe5685600d1107a861861f9e3813dbe68f18f136d04a36e08817a70a124 0.090000000000 309739 of 317823 -
09: dd55e26bfdd1b02433b8bc63114621bb0cd7bf2f01599bc62da9f16750bf038b 0.100000000000 973818 of 982317 -
10: aa998388dd1c325812569f3b4c5e764e945af4136492617eeb43d261a3e7d3b7 0.200000000000 1262950 of 1272212 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



2 inputs(s) for total of 0.420000000000 xmr

key image 00: 1b14a9cd5ec23012512471ee1103c8c41467e1da6fd643c21d1a38877a9dad6a amount: 0.020000000000
ring members blk
- 00: cd977d8db93f4e9f8c850e1f3a48d80431f335055083dc92b65111600cd8cef3 00057743
- 01: f64c03ab75cf883cd7bca549775c83ada5c51d46ff8de91b7a8d1e044dfa9cf5 00093324
- 02: 52f0a19e1df21bcd3b76ca87b7e7af23aa3d3930a603a1cde65421683398e4e3 01215504
key image 01: 6e935a091e4abca732d44431aeab52ba0e628b840480c817b4d1908fb1aaccb0 amount: 0.400000000000
ring members blk
- 00: 304b2477f0fc8dc9307dcb2fe7812569575a0790a83aac288ba22713aff098f1 00182788
- 01: 9a000d49189bafbc33ceb888bf6a0faff68291686586f7ec6809ed50109dd646 00348895
- 02: bafb9c91508afbd4944bac3dc430e0c94ed9dd732b09cc112c158a3547962509 01216179
More details
source code | explorer version (api): devel-2024-08-14-0c4ec39 (1.2)