xmrchain.net & Explore.Moneroworld.com

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Solo mine on your own blockchain to support the monero network!

Monero Website || Make Monero Better!

~~~~Monero Bounties~~~~

Monero Testnet Explorer || Monero Stagenet Explorer

i2p links: exchanged.i2p

Why so ugly? Monero FAQ

Moneroblocks Explorer || Monerohash explorer || Map of Monero Network

For a pretty version of this explorer with javascript. NOTE - this doesn't work when I turn the API off. I AM IN CONTROL OF THE DRUM MACHINE.

Don't use the API

NOTE: This explorer actively tests beta software in production. If it crashes, hooray! We found a bug! Please find a backup explorer for these instances.

The most up to date software for Monero are version: CLI v0.18.4.0, GUI v0.18.4.0

If you need to use a remote node, you should set up your own.

High Fee Bug. Remote nodes can increase your tx fees. Double check before sending. Run your own node.

Autorefresh is OFF

Tx hash: 016bea1452a5a931c5a443b92b78bb12ad1507386292533c4bdcbfb9a8f1222e

Tx public key: 643dd12efd5defa406dd4dbd504e6af50d05be480eb8bd8f017ae2bbefa29ec3
Timestamp: 1458348486 Timestamp [UTC]: 2016-03-19 00:48:06 Age [y:d:h:m:s]: 09:229:05:52:04
Block: 1003269 Fee (per_kB): 0.012071462481 (0.013999068608) Tx size: 0.8623 kB
Tx version: 1 No of confirmations: 2530907 RingCT/type: no
Extra: 01643dd12efd5defa406dd4dbd504e6af50d05be480eb8bd8f017ae2bbefa29ec3

11 output(s) for total of 12.074411820000 xmr

stealth address amount amount idx tag
00: 531f870aa5c54bf557d7f5d11b0aac980935d3017ff11a128a01f7f5fbecd3bc 0.000000020000 969 of 22917 -
01: adbde1084dc26ddd23f15d8976758633b378a1da09ca5b93a42c1a64caaed9e0 0.000000800000 893 of 22877 -
02: f0777231a91afb8a05662b0f6329e4f8fc26224f4afbfbb5acd3466d5b05df24 0.000001000000 19760 of 42362 -
03: bb9091ebc7d3aba6d38f234669b25565b7e2d9a2b41a909fec4b575e60bcfd28 0.000010000000 36793 of 59776 -
04: 604b7d4c88d0371feec0d32921762cda310add6cd8a5c71115773322aaf01fee 0.000400000000 36506 of 77136 -
05: 7ac468ac09870f727eeaa8ce6a60de3fc0f059f9286d2f49fba8f666666712dd 0.004000000000 37307 of 89182 -
06: 62fad1cfacb9efde48fb1495b70d5dceb91b87a4de04fde2a0563a25ad7693eb 0.070000000000 192972 of 263948 -
07: fabb020565a4619fd1f3e915974d71e3efb95ef8d4b794e5f47188bd2acf688f 0.300000000000 797221 of 976536 -
08: 9cf8997f4e9ba9f38bbfef67f8756a9f00bd860d73818550c4b477a91066e369 0.700000000000 422871 of 514467 -
09: 202d51c22fcc7f832a7c89aee2549d52817bdcb0e29fae29a02b680d938b6ff4 5.000000000000 204819 of 255089 -
10: 2afd7eec716717a57d9ae3af0a50d1f584ede74897009cdeaa3382d559fe6ad4 6.000000000000 164664 of 207703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



4 inputs(s) for total of 12.086483282481 xmr

key image 00: da2fe30f6b782b6deade31057f224745bc2d779dbd1394e3b3d7cf5856e3a9c2 amount: 0.006483282481
ring members blk
- 00: 64777663f4f9d81680fa9bf4e4a82c1aa252603444a0429e79946edbccc0e5b5 00808698
key image 01: 198ad127a208e34ecb31991e3bdefc83ca4c7f539b2e01d9f5c3d9f1aebcdf09 amount: 6.000000000000
ring members blk
- 00: a49870a7672e99e6781aa2c451ad016fee850e89c1a8c1093648ad536d3fa264 00999957
key image 02: 462985c58b579eae8cd82b4baae1da8029c55cbf51112345cd17990fb40cc295 amount: 0.080000000000
ring members blk
- 00: 50c5393f0f628a4ad43174008e9abb6d02c18a7d83e0a5ed52ea11bf91165093 00982765
key image 03: 844066e0f3a7267fd81b5e20ae7ef71e5076bef844e16c71dd09a63fa5e189f8 amount: 6.000000000000
ring members blk
- 00: ca5174b1da5c0b3aad5f716798b40cc852be7e84078dc06f01ecd79d867d9262 00991119
More details
source code | explorer version (api): devel-2024-08-14-0c4ec39 (1.2)