xmrchain.net & Explore.Moneroworld.com

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Solo mine on your own blockchain to support the monero network!

Public Node Directory || Monero Block Frequency Tool || Monero Website || Make Monero Better!

Monero Testnet Explorer || Monero Stagenet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly? Monero FAQ

Moneroblocks Explorer || Monerohash explorer || Map of Monero Network

For a pretty version of this explorer with javascript || A note on/for services

NOTE: This explorer actively tests beta software in production. If it crashes, hooray! We found a bug! Please find a backup explorer for these instances.

The most up to date software for Monero are version: CLI v0.18.3.3, GUI v0.18.3.3

If you need to use a remote node, you should set up your own.

High Fee Bug. Remote nodes can increase your tx fees. Double check before sending. Run your own node.

Autorefresh is OFF

Tx hash: f7d7c58023c2c8fb2024a80061a284985ccac25231a591257ed4aa1961670fab

Tx prefix hash: 4b4d7a9cd25b9ac8dbcc609a2be42deaa89ac60d50ee804323b873eff665e302
Tx public key: 828c0dcbc821c1424e7fa489b4eb131ef36b070ffa847e2f3acce78f2a2c9f2a
Timestamp: 1408894087 Timestamp [UTC]: 2014-08-24 15:28:07 Age [y:d:h:m:s]: 09:310:03:14:16
Block: 187596 Fee (per_kB): 0.010000000000 (0.006714754098) Tx size: 1.4893 kB
Tx version: 1 No of confirmations: 2993038 RingCT/type: no
Extra: 01828c0dcbc821c1424e7fa489b4eb131ef36b070ffa847e2f3acce78f2a2c9f2a

2 output(s) for total of 1.080000000000 xmr

stealth address amount amount idx tag
00: d9a1fd9f6d7714c73078b1c3909fedec126644c15515bfbdc954b2a65a5f1c35 0.080000000000 98743 of 269575 -
01: 448353922065aff93c740d9dbdce6c050ed8f980a2f95ca7114b663680a85751 1.000000000000 214343 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-05-11 22:03:10 till 2014-08-24 16:17:03; resolution: 0.62 days)

  • |____________________________________________________*_____________*____________*_____**___________________*________*______________________*______*_______________________*|
  • |_*__________*_____*_____________*_*_*__*_____________*________*__________________________________________________________________________________________________________*|

2 inputs(s) for total of 1.090000000000 xmr

key image 00: e130f115eca6e0e325aff840f4253fb4e8ab4c229d16e991e07f2e5de77efe0d amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3f64819a565323311fefeaf3cc7adac78958a351b2db50c5ff15412939ff227d 00082557 1 5/137 2014-06-12 22:14:39 10:017:20:27:44
- 01: 4e92be75cb2c2634c6a1113d82977a3219926415f4c693bbecb5ff2f4a27575c 00095551 1 21/69 2014-06-21 17:40:15 10:009:01:02:08
- 02: 55e850cada16246d2abf91346b7a75250bb7604e0a11a24994ab63898e139b87 00107063 1 15/66 2014-06-29 17:35:03 10:001:01:07:20
- 03: 0366c420da9ecdd390e2a9adfcd6babb7d86775cfc7ec6dbd3e58667eea2c39c 00112594 1 19/68 2014-07-03 13:35:56 09:362:05:06:27
- 04: 347aaae3406236514bd16d0a5094ad5249ee4512daef0c85a087ed0ce5a2673d 00113416 1 6/28 2014-07-04 03:27:17 09:361:15:15:06
- 05: 3eaabb265c35bf998e167314941af94956485dde3a8c39ef11ff3946a536f065 00130565 1 16/57 2014-07-16 02:32:23 09:349:16:10:00
- 06: e5b0c0d48f6e04ca23fdd5b048486212ca88b4ab9a85d346d2ac335ec3c97077 00139179 1 18/62 2014-07-22 00:38:42 09:343:18:03:41
- 07: 3aaff3c081626e4072e63f6e84564c114362f325eadeb567c26cae47bf39d177 00159340 1 17/67 2014-08-05 00:31:52 09:329:18:10:31
- 08: d73335c5c46e74029cfb9edbdfd9adbcff66e2f8006ef7292a39ee13c8cf96c6 00165311 1 18/66 2014-08-09 04:35:37 09:325:14:06:46
- 09: 69aa241c9f895eeb847e017b369a306f3d4ec7952f5df274dd6f9ab8ea72dce7 00187577 10 2/2 2014-08-24 15:17:03 09:310:03:25:20
key image 01: 6430f5a396b9b670039636aa32224ae329560dd26eb0e91925594fe1837643c5 amount: 0.090000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1ca912a99e30c5fe191696887126f767f0d4fcca0786b8cf363f66b11c56ea28 00035512 1 209/8 2014-05-11 23:03:10 10:049:19:39:13
- 01: 66e3b05c49c721c7c88f00c452a1c809f8c231e6bdd281da1633ca880e7d69ae 00045996 1 1/8 2014-05-18 22:33:26 10:042:20:08:57
- 02: 15f1d2b828d49b9f5a02758f90c78ed1a7c0ef6e26f17b9fd0ad75b598375d3e 00052036 1 7/282 2014-05-22 22:22:28 10:038:20:19:55
- 03: f198aadbd56eb886e5d2ab64a7b73964ea75763d6f0451829e85a32bda9e8176 00064775 1 6/140 2014-05-31 15:15:50 10:030:03:26:33
- 04: 5c986659810b0927d75775d46c3eb9ff625bb2f7c46ee5595c489b64afe133dc 00065970 1 9/143 2014-06-01 09:18:36 10:029:09:23:47
- 05: 1a2e10b8752069cb31fff1c8a928e7de558f6ddf65dd70e6cdb7a0408938ff7c 00067745 1 3/49 2014-06-02 16:28:41 10:028:02:13:42
- 06: a34b81d9f1752029535c6591672c480dc01e666509b34e657a5614e6467e0f12 00070821 1 7/46 2014-06-04 19:04:35 10:025:23:37:48
- 07: 3006c57fed5124913295016d96de04cb55d76928e9b608d9cae122a735081f66 00083509 1 3/112 2014-06-13 13:12:15 10:017:05:30:08
- 08: a7124d7d22332950e9ce923782b4c1beffb5b006498ebe4b7e453ddd4f73f8bd 00091581 1 8/132 2014-06-19 02:45:52 10:011:15:56:31
- 09: 7e17806f036247e48d32c6a65be09b39ff7a6988c82e75317ea7b1a7eaac2fca 00187577 10 1/5 2014-08-24 15:17:03 09:310:03:25:20
More details
source code | explorer version (api): master-2024-03-03-26331e6 (1.2)