xmrchain.net & Explore.Moneroworld.com

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Solo mine on your own blockchain to support the monero network!

Monero Website || Make Monero Better!

~~~~Monero Bounties~~~~

Monero Testnet Explorer || Monero Stagenet Explorer

i2p links: exchanged.i2p

Why so ugly? Monero FAQ

Moneroblocks Explorer || Monerohash explorer || Map of Monero Network

For a pretty version of this explorer with javascript. NOTE - this doesn't work when I turn the API off. I AM IN CONTROL OF THE DRUM MACHINE.

Don't use the API

NOTE: This explorer actively tests beta software in production. If it crashes, hooray! We found a bug! Please find a backup explorer for these instances.

The most up to date software for Monero are version: CLI v0.18.4.0, GUI v0.18.4.0

If you need to use a remote node, you should set up your own.

High Fee Bug. Remote nodes can increase your tx fees. Double check before sending. Run your own node.

Autorefresh is OFF

Tx hash: 08d8dbcf926d073256118662d21e0c3becd4b54d1e44f6af04a4f8c12a8ff451

Tx public key: f685a2a6a2745927f74229ff3c711a401fb9c9b1774b922cc0d65cadc5eb5cde
Timestamp: 1455320877 Timestamp [UTC]: 2016-02-12 23:47:57 Age [y:d:h:m:s]: 09:122:17:22:12
Block: 953667 Fee (per_kB): 0.020871006857 (0.023459836467) Tx size: 0.8896 kB
Tx version: 1 No of confirmations: 2478810 RingCT/type: no
Extra: 01f685a2a6a2745927f74229ff3c711a401fb9c9b1774b922cc0d65cadc5eb5cde

9 output(s) for total of 7.371907810000 xmr

stealth address amount amount idx tag
00: e322c8d2b11b505962f9a596718ae02963057030dbd429d2a8f9e1b73be0855a 0.000000010000 541 of 22372 -
01: df5559dd365cd0684d2bb3308dc5c395977a63e0aaadcad7da364f3766a0e01f 0.000000800000 504 of 22877 -
02: 0d40f4ffc33ec548b6fbdf0f8d5e0e03b8b9bcd1b567decf2ecf0ffb19711f0f 0.000007000000 19060 of 41475 -
03: 3ce0279b47dc636d9c080e48362a6f24b35976ab51f9339f811f32060059964c 0.000900000000 36734 of 81917 -
04: bdc220dafa4204b4b84eb05a4c91358db701dec52a115c4278a8c3d09dbfb055 0.001000000000 47696 of 100402 -
05: fd2d70de4d0019b9272fb9d30497dd2df35d7e40da2fb87673400dc45374706c 0.070000000000 184897 of 263948 -
06: 813b0b38d5c7c2c2ea94e09c5048b728298fae5a85b77579de5792cbdf99a821 0.100000000000 863173 of 982316 -
07: 55a31ac7286053c5560b7c0faafae820b067bcb29773a7b3bb1f444108b20665 0.200000000000 1082910 of 1272211 -
08: 754d9dea1e08de921ea321ab30705c60da35712c19aea001cc7d383b47bab999 7.000000000000 226902 of 285522 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



5 inputs(s) for total of 7.392778816857 xmr

key image 00: 946db5010c51b72098dda5cb48e7ae4625fae2f668dc8adc515f1fd5f5e00115 amount: 0.002778816857
ring members blk
- 00: 9e7fd46d82eb43809ebab85b5a454ea67b9ae2cde59d59cdf1bf45096319d20f 00882426
key image 01: 8664762ee77d048f588135cf87a88b4188759d6e6fddea2729f01a7a453ed55f amount: 0.030000000000
ring members blk
- 00: 026868e75e1ed617c704bdf6c9d4f4eecca2cd0385bcaa6dcdcd9c6dcd09e78a 00948043
key image 02: 8d669a0f8285f603cb810dd6d4aca90aecc63a11b438b8a9023f6520e91db4ff amount: 0.060000000000
ring members blk
- 00: d934a1fa35f52cd37689f6cc52e6b34667715616adf31c8da86998fbe26375ba 00934811
key image 03: bfd0d9c2ee937a41d2b57ccc53515947fc4eec9550c607db3ea862ca957dc021 amount: 7.000000000000
ring members blk
- 00: 83cba9ae1040ebc4bf0e377721bf679a4af0ac55e0d8004887d053530b34dca2 00940980
key image 04: 5ece72f52098002cf339bddd09c2c732417c7af8d2285ce097fae62e27404fff amount: 0.300000000000
ring members blk
- 00: c7b8374a881eda346e8f7cbc4f19b83167e35346c7f5d17e491e0890ac6b72ca 00951716
More details
source code | explorer version (api): devel-2024-08-14-0c4ec39 (1.2)