xmrchain.net & Explore.Moneroworld.com

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Solo mine on your own blockchain to support the monero network!

Monero Website || Make Monero Better!

~~~~Monero Bounties~~~~

Monero Testnet Explorer || Monero Stagenet Explorer

i2p links: exchanged.i2p

Why so ugly? Monero FAQ

Moneroblocks Explorer || Monerohash explorer || Map of Monero Network

For a pretty version of this explorer with javascript. NOTE - this doesn't work when I turn the API off. I AM IN CONTROL OF THE DRUM MACHINE.

Don't use the API

NOTE: This explorer actively tests beta software in production. If it crashes, hooray! We found a bug! Please find a backup explorer for these instances.

The most up to date software for Monero are version: CLI v0.18.4.0, GUI v0.18.4.0

If you need to use a remote node, you should set up your own.

High Fee Bug. Remote nodes can increase your tx fees. Double check before sending. Run your own node.

Autorefresh is OFF

Tx hash: 7f5c00709b2eded29f006e8faf58b7f6187d49f57e0f38e9470eec0a2c8df9bb

Tx public key: f590d33643f1ca122eb3fa5dc0ec397d00d0e8efbbce8c5b8e6587f4f1004a98
Timestamp: 1451959480 Timestamp [UTC]: 2016-01-05 02:04:40 Age [y:d:h:m:s]: 09:162:20:31:13
Block: 898610 Fee (per_kB): 0.010299971547 (0.010442743430) Tx size: 0.9863 kB
Tx version: 1 No of confirmations: 2534750 RingCT/type: no
Extra: 01f590d33643f1ca122eb3fa5dc0ec397d00d0e8efbbce8c5b8e6587f4f1004a98

3 output(s) for total of 12.090000000000 xmr

stealth address amount amount idx tag
00: e0f180f7f538f170d6e3b5f9a84bda705b4eb78418c4190bb248659b015b637f 0.090000000000 208521 of 317823 -
01: e57686a7bd5d3f86a9c5697feaa4c96f40bd8a58bbd27b8024e0a4644373c2fd 5.000000000000 196195 of 255089 -
02: e7eaf9b6ce60df9f79dcbd296dc4bf3e6f204858c534d431affea2629c723ec4 7.000000000000 167187 of 285522 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



8 inputs(s) for total of 12.100299971547 xmr

key image 00: e5673396065ebb843552c9da975018ff9feea54fa57184106653e684ea98d205 amount: 0.000299971547
ring members blk
- 00: b0753f6c5e9ca17dcdf05dd59e0a6424e81dc38730ce5b9cfd57b76bdf158249 00896659
key image 01: 1ad2704c3479839f1529430b4dfb4267a97d57762118b5634e2f42f4227e3de1 amount: 4.000000000000
ring members blk
- 00: 42de36364d42e5e463793c2b93f48d2beb620a2e91421811543e6fcf58dffa34 00898593
key image 02: 1dca32ad2faf060736ff85407b64bc62e6adfbab3dbef7e001240dc89b2d8fac amount: 0.200000000000
ring members blk
- 00: b675ee60d9b0d6da2b5c1196162349a9593a6c196d620b27fa57b03aed906a10 00898593
key image 03: a3e8e7c0a5617b46617c9eeecc003ca5e929ea6a69e96cd05c9614cfab92102b amount: 0.400000000000
ring members blk
- 00: 82de35ffa7f47eef70884cd6790543f5685abd196da67654381bd9ccdf008bfc 00898511
key image 04: 6555a12aea5d40d41e074b1b65f79df46944350a5189c24fadf83b3d448b4689 amount: 0.400000000000
ring members blk
- 00: cf0f56bbfc312a5ef13830a0f72556563d6f81e211c6c57b93e49628264d4240 00898544
key image 05: 71c17167532c9d244b718ac56455a5d24ea8e8fa3b7d943d4859b030443de0f0 amount: 0.080000000000
ring members blk
- 00: ff9f0d61841eb5f3b2a5f44962fb7612645107f48895f08cfaed9ea9a73f2652 00898544
key image 06: 7bed0f1631db91b3169aebc038280e71d3c515ad0a8906567c5ffa9c14b9da51 amount: 0.020000000000
ring members blk
- 00: 39cad4089418b64ba3ce229dd691ba120be7bfb13eb3ae01fbc9c24058abc456 00898593
key image 07: 9ecd9b20b595db324f7b67a0b3e60a4f4cd18b7786098b0054510b982ecc246a amount: 7.000000000000
ring members blk
- 00: abfacbf355bc1d9de67028c5c64ef575912dd5e783cd0376deacdb3af60e7438 00898544
More details
source code | explorer version (api): devel-2024-08-14-0c4ec39 (1.2)