Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: b538e218ddc210cd4a63200ff4cef391a6692adba9ec8128faedf5afc3a5d177

Tx prefix hash: 542daef1425e27149f373d3e086a798893032813b669de0fa3e26c8ab3d006a8
Tx public key: f72b5bd4fd6ac6a0a37e2c856ede8519e526cc2f4de2c649008ff175886374fd
Payment id: 19103ae00ad03f81effe3559232db81ed21fd32328168152fd4f4131dccb52fb
Timestamp: 1408629544 Timestamp [UTC]: 2014-08-21 13:59:04 Age [y:d:h:m:s]: 11:141:17:18:34
Block: 183121 Fee (per_kB): 0.005000000000 (0.015753846154) Tx size: 0.3174 kB
Tx version: 1 No of confirmations: 3399330 RingCT/type: no
Extra: 02210019103ae00ad03f81effe3559232db81ed21fd32328168152fd4f4131dccb52fb01f72b5bd4fd6ac6a0a37e2c856ede8519e526cc2f4de2c649008ff175886374fd

1 output(s) for total of 1.000000000000 xmr

stealth address amount amount idx tag
00: 08da3cb7cab38da2312b86801c30a15602562ded852495dc2234cd59f144cf15 1.000000000000 206106 of 874632 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-08-14 02:51:50 till 2014-08-19 02:32:18; resolution: 0.03 days)

  • |__*_______________________________________________________________________________________________________________________________________________________________________|
  • |________________________________________________________________________________________________________________________________________________________________________*_|

2 inputs(s) for total of 1.005000000000 xmr

key image 00: d6853b622080769e9b38455f8516ea013268939578f2b26863f7c7e85a5371fd amount: 0.005000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 433c488a3c74f3ca2a98a17305ad90adbd47839453578421cf447b1c42982155 00172426 1 3/4 2014-08-14 03:51:50 11:149:03:25:48
key image 01: 401850772ae412230ca8e32e45a24c7a92b9b9d30965f0bd698e8ecb3c497dd4 amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c12aa6b72d116220cd313d3b3239fb5b940982c2f15fbefa4ff6796bc055ffe8 00179436 3 21/76 2014-08-19 01:32:18 11:144:05:45:20
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 5000000000, "key_offsets": [ 210736 ], "k_image": "d6853b622080769e9b38455f8516ea013268939578f2b26863f7c7e85a5371fd" } }, { "key": { "amount": 1000000000000, "key_offsets": [ 199893 ], "k_image": "401850772ae412230ca8e32e45a24c7a92b9b9d30965f0bd698e8ecb3c497dd4" } } ], "vout": [ { "amount": 1000000000000, "target": { "key": "08da3cb7cab38da2312b86801c30a15602562ded852495dc2234cd59f144cf15" } } ], "extra": [ 2, 33, 0, 25, 16, 58, 224, 10, 208, 63, 129, 239, 254, 53, 89, 35, 45, 184, 30, 210, 31, 211, 35, 40, 22, 129, 82, 253, 79, 65, 49, 220, 203, 82, 251, 1, 247, 43, 91, 212, 253, 106, 198, 160, 163, 126, 44, 133, 110, 222, 133, 25, 229, 38, 204, 47, 77, 226, 198, 73, 0, 143, 241, 117, 136, 99, 116, 253 ], "signatures": [ "6bf06b59a386ad23a71060ce202ae24ae159d969292e4d9b7feeb3c8969d51022d002c0491ede7607948ba86650e87c6263f77b07aee355a3b07d9bc1a04060c", "549a97006542e9acc1658084931c16719c0ba61d012b50f284cbda8d23375f0aba60fd98d636a6b96951d2eccae7fd2d39aec18b5d2d69df7f5c0e74d8e87606"] }


Less details
source code | explorer version (api): master-2025-07-17-33c73de (1.2) | monero version: 0.18.4.2-release