xmrchain.net & Explore.Moneroworld.com

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Solo mine on your own blockchain to support the monero network!

Monero Website || Make Monero Better!

~~~~Monero Bounties~~~~

Monero Testnet Explorer || Monero Stagenet Explorer

i2p links: exchanged.i2p

Why so ugly? Monero FAQ

Moneroblocks Explorer || Monerohash explorer || Map of Monero Network

For a pretty version of this explorer with javascript. NOTE - this doesn't work when I turn the API off. I AM IN CONTROL OF THE DRUM MACHINE.

Don't use the API

NOTE: This explorer actively tests beta software in production. If it crashes, hooray! We found a bug! Please find a backup explorer for these instances.

The most up to date software for Monero are version: CLI v0.18.4.0, GUI v0.18.4.0

If you need to use a remote node, you should set up your own.

High Fee Bug. Remote nodes can increase your tx fees. Double check before sending. Run your own node.

Autorefresh is OFF

Tx hash: 60c09aaa706b4fcfdd102cd4e6bac1c8edf94f41d7e94cc34a3633dd5eb106a8

Tx public key: 3fde459afee1592eddf8dc6f5d497b561400396d7e93ddd5b150548c8e86f7fe
Timestamp: 1458004018 Timestamp [UTC]: 2016-03-15 01:06:58 Age [y:d:h:m:s]: 09:213:23:47:56
Block: 997588 Fee (per_kB): 0.025764589856 (0.029946583442) Tx size: 0.8604 kB
Tx version: 1 No of confirmations: 2522789 RingCT/type: no
Extra: 013fde459afee1592eddf8dc6f5d497b561400396d7e93ddd5b150548c8e86f7fe

11 output(s) for total of 7.678534590000 xmr

stealth address amount amount idx tag
00: 073d05fe80c5e4d580aa1d080ca78d2058cb8bfb68700d707d010d6201257c5e 0.000000090000 1024 of 23500 -
01: 039ec848a67438192a00d9d6064113d202e9b5c34efca11fc63695cd5d6eb616 0.000000500000 914 of 22924 -
02: bb49f5e3df2cd1fe428615b57b0587af99722c8b865086808a99ecdb5928aff3 0.000004000000 19231 of 41587 -
03: e760f9bb3190cc89cd65436ae63a6b433f5b623ec5a6843ebafa834a9dfd4c4c 0.000030000000 36311 of 59487 -
04: 0d0460c93740ef2d763c043868fe011b01546436df6bb809a9b765e5ca1a5a48 0.000500000000 36772 of 77942 -
05: 887eefb2725dcec4a617d67399e8ff815595f6b14177c52126a6bf4ddf2f49bd 0.008000000000 189026 of 245069 -
06: 6e3612a06f7a648e2d6a32608257995f9fa459c71980956c86f1ca73fa0defef 0.010000000000 431777 of 502468 -
07: b8a0a9921f9c008cbc8dd0fcb3d5d3a6e524705f53c77e62b80e581577cba162 0.060000000000 199126 of 264761 -
08: 93a576d5cc55426f1626f2b2b2059508287cabfdc2d9cd08115d9b84d34c497d 0.800000000000 397871 of 489959 -
09: 887d5069395164042a6a941cc2c35f853a046d50dd19920b6763c8f03aa93952 0.800000000000 397872 of 489959 -
10: dff51e5ac58e4fc17fd51094f1497b3a14da30fc5c91b5620f28ea2abbfdf031 6.000000000000 158643 of 207703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



4 inputs(s) for total of 7.704299179856 xmr

key image 00: 1b32714677962df4991ea06d079558fba09e77e4ee8726ac47b8e0ecf02f9926 amount: 0.004299179856
ring members blk
- 00: 01b65caa479e25d170e0829b0501fb269a91f271cc8becc5236ebb44948f7f7a 00933088
key image 01: 151a9941addebda581bb096953a80b40f8e19e5d6dacf93918025bc5e81299f0 amount: 6.000000000000
ring members blk
- 00: 916f3359f8bf46fc5f05ab52b155ad85cca76ae19237b91301842b7fabe965d8 00996622
key image 02: 29bc72d4387421fb8b5453e1e8434612c68ab588697e455413e03fc061e141cf amount: 0.800000000000
ring members blk
- 00: d2c1fe301cf2e3bb22083635486fa5bbac4ebbc1dc3b3f2c4160c268c60b75ae 00987609
key image 03: f47ff7d188dfba9d9ca8c49b53f7f185b10dc99af405e148439385e1633ec5b6 amount: 0.900000000000
ring members blk
- 00: a464d79a4a0da35aa8eee64e67bb274e338bf949ee8c29d1c994cbbcd2412a88 00981472
More details
source code | explorer version (api): devel-2024-08-14-0c4ec39 (1.2)