xmrchain.net & Explore.Moneroworld.com

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Solo mine on your own blockchain to support the monero network!

Monero Website || Make Monero Better!

~~~~Monero Bounties~~~~

Monero Testnet Explorer || Monero Stagenet Explorer

i2p links: exchanged.i2p

Why so ugly? Monero FAQ

Moneroblocks Explorer || Monerohash explorer || Map of Monero Network

For a pretty version of this explorer with javascript. NOTE - this doesn't work when I turn the API off. I AM IN CONTROL OF THE DRUM MACHINE.

Don't use the API

NOTE: This explorer actively tests beta software in production. If it crashes, hooray! We found a bug! Please find a backup explorer for these instances.

The most up to date software for Monero are version: CLI v0.18.4.0, GUI v0.18.4.0

If you need to use a remote node, you should set up your own.

High Fee Bug. Remote nodes can increase your tx fees. Double check before sending. Run your own node.

Autorefresh is OFF

Tx hash: ac3826e1e7e5410a00ee8d56218d16e1d7aaba8f3ced277a688bdadf5dda15d4

Tx public key: 47535747c14c944a7c7379955a8697249096f9bd7a644d8feaf5ebaf535b24a9
Timestamp: 1456705965 Timestamp [UTC]: 2016-02-29 00:32:45 Age [y:d:h:m:s]: 09:184:03:46:39
Block: 976326 Fee (per_kB): 0.016895687043 (0.019638119787) Tx size: 0.8604 kB
Tx version: 1 No of confirmations: 2511782 RingCT/type: no
Extra: 0147535747c14c944a7c7379955a8697249096f9bd7a644d8feaf5ebaf535b24a9

11 output(s) for total of 7.918326630000 xmr

stealth address amount amount idx tag
00: ecd64705af232f2178d46e5c33ad83525e5cafc42d739f6a276656e9584d24d1 0.000000030000 601 of 22504 -
01: cd552cbcb131b475232c56472d62fdc5066740b7a94d3d5bb6e295afaf795696 0.000000600000 674 of 22714 -
02: 4a0a8b3fb61f1f2289b4b80d9e5c608f2841cd49e7d6dfe99a01f460a4b7f3f7 0.000006000000 19678 of 42150 -
03: dfb7fdc1041c724abeb544e3f922e0e40ba5dd005c0c08ab3d16706c601bf41c 0.000020000000 36566 of 59482 -
04: e33bcd2d38c116e2a87a186132601cf2337b0a3f32903974fb3ad77209ae7cec 0.000300000000 36840 of 78258 -
05: 4672968f6a0429d89701448d48f439def0b125a2ad3c60adbae6882913a17490 0.008000000000 188271 of 245069 -
06: 93735e56ef17a9b696bd0cbd2fbfa1aa6ec0aedd44d829b827a62c24793c2dca 0.050000000000 210491 of 284524 -
07: 297276cedaeaf8de0d665d9d7e0ab1b254fd74d5ad45f7f49f11db04e7a998af 0.060000000000 196125 of 264761 -
08: 27517369a11b8f786772a01c5f58d8d7add0cd48dc14b8ed4f32f7b138aafda7 0.900000000000 342506 of 454894 -
09: 630fbfb0fde4f00abbf5878a10a57fe56e2a627480ef5479703dcfc80ed52e6c 0.900000000000 342507 of 454894 -
10: 88d2ab699c6032046111d0c1e585a0f03ee46fcdf890e1ce91e6039fb5b6e791 6.000000000000 137703 of 207703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



4 inputs(s) for total of 7.935222317043 xmr

key image 00: 0e8f1fe15494ca7fad78b2034a5927690f01bc310f1311b6f3383d97bfe6605f amount: 0.005222317043
ring members blk
- 00: af127b7c586592150229e9f94f12a764ba576d8654c9fb842aba5946dbd57ff5 00882089
key image 01: e00271ac53bb2bd383aacb63b97d8fa9796d368c78a34b2c6988f24a197524c5 amount: 0.030000000000
ring members blk
- 00: 5be13b5eee02017b7d0bf3ed5ef388fb465237d79c8603bc9b5cfb435b1493df 00972905
key image 02: a27cb8a34599be7c2538b66aabd767e78197ddb4e4967fb210f40b81d3455822 amount: 0.900000000000
ring members blk
- 00: 55daeee752df0f16634e402c1195ec7122d4c0cbbbfd1ac7b22e4cfb6355d790 00974301
key image 03: 48847dc64763a4b8ebe778c1523138b49add877c6cf48ad6913448ce52c30c03 amount: 7.000000000000
ring members blk
- 00: 34274a3898746cfbccd20760299b283963792d13d6b498578866438f6683d377 00975124
More details
source code | explorer version (api): devel-2024-08-14-0c4ec39 (1.2)