xmrchain.net & Explore.Moneroworld.com

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Solo mine on your own blockchain to support the monero network!

Monero Website || Make Monero Better!

~~~~Monero Bounties~~~~

Monero Testnet Explorer || Monero Stagenet Explorer

i2p links: exchanged.i2p

Why so ugly? Monero FAQ

Moneroblocks Explorer || Monerohash explorer || Map of Monero Network

For a pretty version of this explorer with javascript. NOTE - this doesn't work when I turn the API off. I AM IN CONTROL OF THE DRUM MACHINE.

Don't use the API

NOTE: This explorer actively tests beta software in production. If it crashes, hooray! We found a bug! Please find a backup explorer for these instances.

The most up to date software for Monero are version: CLI v0.18.4.0, GUI v0.18.4.0

If you need to use a remote node, you should set up your own.

High Fee Bug. Remote nodes can increase your tx fees. Double check before sending. Run your own node.

Autorefresh is OFF

Tx hash: c1bea13bb0d2c3db007b2fe16b28501d66c904a922accc48a56b96bd4af321b5

Tx public key: 1008a30629ce2811112c0dc08da022af9f9dd3284078c7402def76be3f20c770
Timestamp: 1442582955 Timestamp [UTC]: 2015-09-18 13:29:15 Age [y:d:h:m:s]: 09:310:09:23:25
Block: 744733 Fee (per_kB): 0.022264885035 (0.022595879362) Tx size: 0.9854 kB
Tx version: 1 No of confirmations: 2716669 RingCT/type: no
Extra: 011008a30629ce2811112c0dc08da022af9f9dd3284078c7402def76be3f20c770

3 output(s) for total of 11.030000000000 xmr

stealth address amount amount idx tag
00: c83c90c47a544de6092c8cf3dde75109d2914a428de40d81d736e9de6002c33b 0.030000000000 222305 of 324338 -
01: a7e63b96cd0d8f5132747bdac2ba35ea7ec097754738b1724b2c2b7d0192574a 2.000000000000 295270 of 434058 -
02: 13d1692e4df40110f0a23adc2723d2becf3c41a92534c32eaf772cfdd933f87a 9.000000000000 166588 of 274259 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



8 inputs(s) for total of 11.052264885035 xmr

key image 00: 90c8d5e1aaf6461bfa01881e22a2ce5f26f17ede4b33dac518d21b1c85eede11 amount: 0.002264885035
ring members blk
- 00: 6a5d31182c29ca3f27975bbc1d67e205c07243eb1a04e879679a1bee1eb7bff4 00739556
key image 01: 2bcbfd97ced063bb9800c6afcee4d722d2a5a84dcdfb42055a58e6e50c7e770b amount: 0.090000000000
ring members blk
- 00: 9425b009514bc6ce5079e74987f6788eecc20506b98757495f96fb50fd5346c3 00744685
key image 02: 2ea7af11573c05f96769d548ef53e4d3e6fbf25ccced26e054068fbefe23ff81 amount: 1.000000000000
ring members blk
- 00: fa71e731eaf5b4ca30eddaa559003f7407785d9f1a8e37bee90e7b4ad5b798a9 00744685
key image 03: 836b14d2fac3aacd4a6ef68360822b0851e3c97a89f787c1d402cfef1008ae81 amount: 0.060000000000
ring members blk
- 00: 9e78d6da400cefce66b7e274a6b7ab127d44c14a72930da8a4b7f892b2db5d58 00744672
key image 04: 2f04c12ea92e8d50597188175d80af16fa56d1e6e3d06416546f3b4b5677a03e amount: 0.300000000000
ring members blk
- 00: dafee81126861b9fd26905a4915679e4f32577135ff1979491382bfe497b756b 00744685
key image 05: 734afa7cfab32bc9c80b026f03b5adc069cb7556985556d581ad6d16ae08f4a3 amount: 1.000000000000
ring members blk
- 00: 37f77eac891a5fabecdf75c90ea9ed56739d4363706df653b931a463beed45e3 00744689
key image 06: 44cdbb45139979af09a19e0982b516d807385ec1d8fd8f5591478b7313e31fc4 amount: 0.600000000000
ring members blk
- 00: f3265d30f963b367acc9ef91eb1caea696307b6fdc670f4c4418acd9436a5353 00744689
key image 07: 8750ac0040e1818774f9d6cf84a1cb27f1680972e397545108422ff5010d52cc amount: 8.000000000000
ring members blk
- 00: 4bbd7e6a723724be79cedca07e007cc81826bca1e007d6a151abadcd4aa63f73 00744672
More details
source code | explorer version (api): devel-2024-08-14-0c4ec39 (1.2)