Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: b2c677d7caa0edc1db6ec817ad5cadf0d27111a5122a654402d9d11daea680bd

Tx prefix hash: 2987c7499088123c53d5ba6a4a0bbae055f66db2c5329c5f51e625ebbf6ca4c7
Tx public key: 54c21701c6da3f77746d7bbdb05c788a291c5a40f690965b6bd673c3663adafa
Timestamp: 1420917417 Timestamp [UTC]: 2015-01-10 19:16:57 Age [y:d:h:m:s]: 11:000:07:19:38
Block: 386233 Fee (per_kB): 0.100000000000 (0.351890034364) Tx size: 0.2842 kB
Tx version: 1 No of confirmations: 3196774 RingCT/type: no
Extra: 0154c21701c6da3f77746d7bbdb05c788a291c5a40f690965b6bd673c3663adafa

1 output(s) for total of 0.900000000000 xmr

stealth address amount amount idx tag
00: 53c83c63ecc12912378cacbbf7d63cee80c92c9ac2fc82a835396772fdcc6ad4 0.900000000000 188568 of 454894 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2015-01-09 19:50:38 till 2015-01-10 18:40:49; resolution: 0.01 days)

  • |__________________________________________________________________________________________________________________________________________________________________*_______|
  • |________*_________________________________________________________________________________________________________________________________________________________________|

2 inputs(s) for total of 1.000000000000 xmr

key image 00: 5a406c9c0bed04896d3cd721a003f89bb9c3997d48e3813b0b5ef030d651f6a3 amount: 0.300000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 55550ab076ce4d4ca1a7766c9e12d9a38cceb1e003f8d2f774e5e73bfc9328e0 00386129 1 4/46 2015-01-10 17:40:49 11:000:08:55:46
key image 01: 770f7820f2310fae3db5a02d3d77a93a984291613504e5d0e3c799a850cd473b amount: 0.700000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ba1ac4766b6fe1cb0c5ac78e2b027612541fddb6c21ad84083fb4561c152ab18 00384865 1 28/113 2015-01-09 20:50:38 11:001:05:45:57
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 300000000000, "key_offsets": [ 414123 ], "k_image": "5a406c9c0bed04896d3cd721a003f89bb9c3997d48e3813b0b5ef030d651f6a3" } }, { "key": { "amount": 700000000000, "key_offsets": [ 241940 ], "k_image": "770f7820f2310fae3db5a02d3d77a93a984291613504e5d0e3c799a850cd473b" } } ], "vout": [ { "amount": 900000000000, "target": { "key": "53c83c63ecc12912378cacbbf7d63cee80c92c9ac2fc82a835396772fdcc6ad4" } } ], "extra": [ 1, 84, 194, 23, 1, 198, 218, 63, 119, 116, 109, 123, 189, 176, 92, 120, 138, 41, 28, 90, 64, 246, 144, 150, 91, 107, 214, 115, 195, 102, 58, 218, 250 ], "signatures": [ "8d43f84b1dd8684488a0d4796918f9a7e464d321952fa7b8b7a99310d602f80e927e8521482c52bc856d1d9c4cb6508879d222ad4ac8faa91a62b0c5f6ce5105", "8204d2f5c4b7714b4935a541a82dff4c87f753a517ee623d1e2156a1b8bf2a0afd574d9d7a28e1597091461408606a31b5c83f41fb5c44d561b46f91d6867c06"] }


Less details
source code | explorer version (api): master-2025-07-17-33c73de (1.2) | monero version: 0.18.4.2-release