xmrchain.net & Explore.Moneroworld.com

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Solo mine on your own blockchain to support the monero network!

Monero Website || Make Monero Better!

~~~~Monero Bounties~~~~

Monero Testnet Explorer || Monero Stagenet Explorer

i2p links: exchanged.i2p

Why so ugly? Monero FAQ

Moneroblocks Explorer || Monerohash explorer || Map of Monero Network

For a pretty version of this explorer with javascript. NOTE - this doesn't work when I turn the API off. I AM IN CONTROL OF THE DRUM MACHINE.

Don't use the API

NOTE: This explorer actively tests beta software in production. If it crashes, hooray! We found a bug! Please find a backup explorer for these instances.

The most up to date software for Monero are version: CLI v0.18.4.0, GUI v0.18.4.0

If you need to use a remote node, you should set up your own.

High Fee Bug. Remote nodes can increase your tx fees. Double check before sending. Run your own node.

Autorefresh is OFF

Tx hash: 6256fcb325dd6f4c9842a19eff4745dbad311365d41f46ac49eb66cc431646cf

Tx public key: 51a3e915cf56ec6f2be9f3ed84129aa2ed0f55a3f62fa75becc2d41ac0b208ca
Timestamp: 1451950433 Timestamp [UTC]: 2016-01-04 23:33:53 Age [y:d:h:m:s]: 09:276:15:19:52
Block: 898494 Fee (per_kB): 0.024097198334 (0.027945108827) Tx size: 0.8623 kB
Tx version: 1 No of confirmations: 2616533 RingCT/type: no
Extra: 0151a3e915cf56ec6f2be9f3ed84129aa2ed0f55a3f62fa75becc2d41ac0b208ca

11 output(s) for total of 9.050749520000 xmr

stealth address amount amount idx tag
00: e613dab885dc7bd6a0a47fb5742a3d3e247fa674222f3bb87667d9b54db407dc 0.000000020000 119 of 22917 -
01: 37833387d557a747ba3ae1accfb4538efc285c38eb6f50aa509fff1cf4d1c6a8 0.000000500000 134 of 22924 -
02: f288182186982abb5bf9f083e8cac39153d5f5c8782a0b3aedaa63eb9d596d2c 0.000009000000 22413 of 46397 -
03: 778594f6f560085faf5a64df1e46ad0983a8f35d761c6ef0c1d2999f5b2b5b84 0.000040000000 35466 of 58752 -
04: 6b4c94a8e92d8fef844c14e13038eeced642f57b6aa64c125077cc086ef0bb6f 0.000700000000 35248 of 77523 -
05: e6a9f2ab3b032171874153beeda104fe8a2229a21e663522b4585c1c08bbf9db 0.060000000000 184312 of 264761 -
06: c8d208bd99028d51c246347e8302e68e576aaabfe847bfe17c9ca87fbdedd7ae 0.090000000000 208491 of 317823 -
07: 42a5568f743523c1f22932c88bedb3a2a8d20bca9d2d2eb309ce5e91d973c8eb 0.400000000000 531990 of 688584 -
08: 6ce2042913fd8b631dfe64de0dbcbc8c6d9c0c671ef480b423264d24e3fa9295 0.500000000000 924927 of 1118625 -
09: 008df50d66d7fbd5194ab98d5a978480aebc39e5fceef91107aae653b4fa464c 1.000000000000 668003 of 874632 -
10: 4c2272754c058bb316cd943842ca5191abe10354bc282760b0a54277f9b32bbd 7.000000000000 167053 of 285522 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



4 inputs(s) for total of 9.074846718334 xmr

key image 00: 031415ad899fc57a7f04b2b21ac85956f7367c80aa04b7103c799d4e6b522265 amount: 0.004846718334
ring members blk
- 00: 0e7fec3972aa6e2aa2bb9da14514c496f1b96b322f291bdfc013dfdc960aab06 00894627
key image 01: 2d6bb68a6d8faad950e0384f83a2377920a4b86de4ec6d83dfdc2cad165d7c72 amount: 0.070000000000
ring members blk
- 00: 86af04e077778a256fa15da56b12ccecacd2dc30f03480221c970bd805ec2de4 00886023
key image 02: 964e062826f3903bc7c9b903f0c434f0630b1f731f97f3eaa55b54e0a941c59e amount: 7.000000000000
ring members blk
- 00: 551213e4db3c2188ce7d77ca28a7b6a5f7a56de8fd80870463bd856a20994b19 00897791
key image 03: e271fe6a7bff32592abf09dd6f02d24b97aa608fdb4865d0fea8329635763d07 amount: 2.000000000000
ring members blk
- 00: c941025079e8679e4040330a9452e7ffabe285727e2264eab9e8042b072bd041 00892943
More details
source code | explorer version (api): devel-2024-08-14-0c4ec39 (1.2)