xmrchain.net & Explore.Moneroworld.com

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Solo mine on your own blockchain to support the monero network!

Monero Website || Make Monero Better!

~~~~Monero Bounties~~~~

Monero Testnet Explorer || Monero Stagenet Explorer

i2p links: exchanged.i2p

Why so ugly? Monero FAQ

Moneroblocks Explorer || Monerohash explorer || Map of Monero Network

For a pretty version of this explorer with javascript. NOTE - this doesn't work when I turn the API off. I AM IN CONTROL OF THE DRUM MACHINE.

Don't use the API

NOTE: This explorer actively tests beta software in production. If it crashes, hooray! We found a bug! Please find a backup explorer for these instances.

The most up to date software for Monero are version: CLI v0.18.4.0, GUI v0.18.4.0

If you need to use a remote node, you should set up your own.

High Fee Bug. Remote nodes can increase your tx fees. Double check before sending. Run your own node.

Autorefresh is OFF

Tx hash: 671c564a0e447b8fbaf25f9c46551d86e635cc85ebd5269060bbab3b68f1445f

Tx public key: 4922232954fe476630a6276fe8cab66c889455500e2ba5289a308a8e3358aeb0
Timestamp: 1451817947 Timestamp [UTC]: 2016-01-03 10:45:47 Age [y:d:h:m:s]: 09:203:18:27:27
Block: 896279 Fee (per_kB): 0.023029478595 (0.026737172428) Tx size: 0.8613 kB
Tx version: 1 No of confirmations: 2565318 RingCT/type: no
Extra: 014922232954fe476630a6276fe8cab66c889455500e2ba5289a308a8e3358aeb0

11 output(s) for total of 12.062248180000 xmr

stealth address amount amount idx tag
00: 811ece798df396f23c9f50f18fce779e9cdda4e01c34e5a1e375ea77941f3522 0.000000080000 84 of 22810 -
01: e04ceff27775fd0e068bef8befb0578b7f5ab9474cd75f38efaa7775b414f540 0.000000100000 110 of 22829 -
02: e1ddfdb0ad27da7d70267ff4978f545ce541959982b55e06d2e1b8990990718c 0.000008000000 19455 of 42743 -
03: 3aab76ab3e133f3d734da3c801c2dca45a85cfaa799c046222df83ab34befde4 0.000040000000 35444 of 58751 -
04: e55de0634cbaf9a28ebef61bb8518e20677e6f4497e3736996caaa58935b7082 0.000200000000 35796 of 78039 -
05: 857c9ef9211c61976a9ad7ed68d57c761f19a650a63a5c8413bcf34b3eff574f 0.002000000000 42906 of 95916 -
06: 168fcf19029363a5c3b78945b9abf5a4428b15d415c4a5f921da1ecd90d4e947 0.060000000000 183980 of 264761 -
07: 979a1ae98697428a4f2ad90e843cfbd5fdc2268dcd94a99275cd8f414e0eb1a2 0.500000000000 923297 of 1118625 -
08: 7fd3005088af6ec96954d3463daecaeeee70ca0a51f3acdd71dcca7f075baeb8 0.500000000000 923298 of 1118625 -
09: 92ebc4e8d2e5be53253d76576014ce142639ecdd08182222a4e02ddbc8ab08bc 4.000000000000 184707 of 237197 -
10: 74af835b23c0fa2bd648ae5dd7388803a41b989bb1487905f529f9d55c7f627b 7.000000000000 164562 of 285522 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



4 inputs(s) for total of 12.085277658595 xmr

key image 00: 0e8d616c75148fe01f19ff02320ea951fc050317bc0c8b341d42917ffa17ddf1 amount: 0.005277658595
ring members blk
- 00: 260ac64a255152b7c3fac7a0abc0b237b3cf1a31d41c7bc4c371f5f9248e6b42 00893518
key image 01: 5b4cc8604c3efcb04efd6b5d010675174b76476f9a6e0ae9d7fa49ede2444223 amount: 6.000000000000
ring members blk
- 00: 536c582897973dbbefdae41c2accfe8e9058702ca4682004506f773645bcc68b 00893638
key image 02: 06c610ccebe9944dfc8ef6f700cad5e0a5df0ccc00b9850b5ee88e818b6ad15a amount: 0.080000000000
ring members blk
- 00: 955268ccfbea9d97dde9a6d5138eda345edd863cb5eb88b82d3aeee1760b9d90 00895147
key image 03: 60e033b07868b35f91709018f3f396042426c2b79809144c361fdef3c450e45d amount: 6.000000000000
ring members blk
- 00: c1ace5dc756b7e3a4d1d89a079411b92d02be8d764250d3027e23e41bab79dbe 00890017
More details
source code | explorer version (api): devel-2024-08-14-0c4ec39 (1.2)