xmrchain.net & Explore.Moneroworld.com

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Solo mine on your own blockchain to support the monero network!

Public Node Directory || Monero Block Frequency Tool || Monero Website || Make Monero Better!

Monero Testnet Explorer || Monero Stagenet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly? Monero FAQ

Moneroblocks Explorer || Monerohash explorer || Map of Monero Network

For a pretty version of this explorer with javascript || A note on/for services

NOTE: This explorer actively tests beta software in production. If it crashes, hooray! We found a bug! Please find a backup explorer for these instances.

The most up to date software for Monero are version: CLI v0.18.3.3, GUI v0.18.3.3

If you need to use a remote node, you should set up your own. Good guide for setting up a remote node.

High Fee Bug. Remote nodes can increase your tx fees. Double check before sending. Run your own node.

Autorefresh is OFF

Tx hash: a975ebfc8836f1133720db8ad7ce5ec5d5a9feb07f091377dcb7a6554fc57903

Tx prefix hash: dd9a4e28aaa02d8b5a43dbaf1f70f0a4d4956ba6acc22821aea853fd08380a0d
Tx public key: c8a64fecf8b85e1d20a8141526ac421796dc43299c39ab0a02e8a7f6b91a48fb
Timestamp: 1410552168 Timestamp [UTC]: 2014-09-12 20:02:48 Age [y:d:h:m:s]: 09:266:02:03:17
Block: 215083 Fee (per_kB): 0.100000000000 (0.082714054927) Tx size: 1.2090 kB
Tx version: 1 No of confirmations: 2947593 RingCT/type: no
Extra: 01c8a64fecf8b85e1d20a8141526ac421796dc43299c39ab0a02e8a7f6b91a48fb

2 output(s) for total of 1.200000000000 xmr

stealth address amount amount idx tag
00: 1c37f8559ed429b9842431fa3026287dbcf4f401e22164133b51613cb808311f 0.200000000000 487408 of 1272210 -
01: 829957add3d0bd61890a2e14abcb37d3bdf3af099e9ef092132e331f86ddb0be 1.000000000000 255353 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-06-07 03:38:05 till 2014-09-04 16:06:32; resolution: 0.53 days)

  • |____________________*_______________________________________________**_____*_____________________________________________________________________________________________*|
  • |_*_______________________*___________________________*___________________*_______________________________________________________________________________________________*|
  • |___________________________________*__________*_*_____________________________________________________*__________________________________________________________________*|

3 inputs(s) for total of 1.300000000000 xmr

key image 00: 80102418b8d4d53bd4725ed20958493dbbbbb1bc66b80cf31fd6357b053f5eab amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: dc1ceb735059f14875e6db50cd6dbbf7142e212df17ea2bb9d1e4b4752229e30 00089163 1 4/39 2014-06-17 10:41:28 09:353:11:24:37
- 01: c034ef2b2b56f54200c0110216f0d5e7e235b5722e9c4c636876a21acee4840b 00126042 1 18/61 2014-07-12 22:41:10 09:327:23:24:55
- 02: 4f24736e0872788259e59806f170cc22d2e91248fc6851b729f04323bdd16c61 00126649 1 19/58 2014-07-13 10:32:53 09:327:11:33:12
- 03: a36fbde8bf209746c77d1884764794ea77ff307791d58ca41e21147b5e0d837f 00130938 1 18/65 2014-07-16 08:36:04 09:324:13:30:01
- 04: 20f478624f42b6db104f12585b8968e5cfa1358db83e00b2a6a57194b8c3cfc9 00203263 4 4/11 2014-09-04 15:06:32 09:274:06:59:33
key image 01: 5850142800374dee8a7e0bcd95b30a9a0f4981c87a19b6a8d9916f68137f49cc amount: 0.300000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e744754977639f1b5380e06c9baee4e6abedcb80f267ff424f32c7b8bfdbd880 00074230 1 4/77 2014-06-07 04:38:05 09:363:17:28:00
- 01: 6d9ff1050076d7bfafc053bbf5073f457e7783c0b32be18f061673fbf3b668e0 00092782 1 4/174 2014-06-19 21:35:18 09:351:00:30:47
- 02: 28edf3eaef8823a42969ebdf37243a092cde331d2dc809f4b4f65ac6e8cb096f 00114936 1 3/4 2014-07-05 04:58:46 09:335:17:07:19
- 03: e096e71d750c8430303370765e91d9f5106cdc3bfbe2cb44c512e7be47855c2f 00130005 0 0/5 2014-07-15 17:29:21 09:325:04:36:44
- 04: 2c997cb5fa949b43253a31bb300209b939df6337ce19bda42ef8c82e1b724eae 00203139 4 3/8 2014-09-04 12:43:01 09:274:09:23:04
key image 02: 30926c101580291baf8a277c6a7eaca5bda40e45a40c8b86ef84a396cd88a3c8 amount: 0.500000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 146fa971f2e5d031a668cefa53ae6b1926a80be170d1aa6995483188d6f1cb5a 00100829 1 16/38 2014-06-25 11:02:45 09:345:11:03:20
- 01: b4002b76d680a67998981dcb3c29bd110ed5edb14d06c32147b68dd9bcce3742 00108994 1 14/64 2014-07-01 01:35:01 09:339:20:31:04
- 02: 8ca0fcdc8a07e3eafe81aa7ad2177574d09c7ff708558c5cc01b33546aa1a1c4 00110466 1 29/65 2014-07-02 02:05:16 09:338:20:00:49
- 03: bc843a72b86709e00ca14d3154353342bc40be81cca6fa9d3b792e5dc35c1a4e 00151847 1 25/64 2014-07-30 19:17:17 09:310:02:48:48
- 04: 8c6a032f53886cd5606e5e2974ef03545e6538258bee9eaf894dbb62059b644a 00202708 4 3/8 2014-09-04 05:52:59 09:274:16:13:06
More details
source code | explorer version (api): master-2024-03-03-26331e6 (1.2)