xmrchain.net & Explore.Moneroworld.com

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Solo mine on your own blockchain to support the monero network!

Monero Block Frequency Tool || Monero Website || Make Monero Better!

Monero Testnet Explorer || Monero Stagenet Explorer

i2p links: exchanged.i2p , Local Monero (lm.i2p)

Why so ugly? Monero FAQ

Moneroblocks Explorer || Monerohash explorer || Map of Monero Network

For a pretty version of this explorer with javascript. NOTE - this doesn't work when I turn the API off. And it is currently off.

Where's the API?

NOTE: This explorer actively tests beta software in production. If it crashes, hooray! We found a bug! Please find a backup explorer for these instances.

The most up to date software for Monero are version: CLI v0.18.3.4, GUI v0.18.3.4

If you need to use a remote node, you should set up your own.

High Fee Bug. Remote nodes can increase your tx fees. Double check before sending. Run your own node.

Autorefresh is OFF

Tx hash: 3689f36cc5d709156549d3d2a112442dccb90d75f82fa6786528895d06877997

Tx prefix hash: e80eb8661c00812583078cbfb792ef88f490c21654b6ecc70728228b770dea1f
Tx public key: 7ea54a72b5472c011d6814fd2f80a4be16cfa09e67ee7b338ec88ce391b47015
Timestamp: 1413088045 Timestamp [UTC]: 2014-10-12 04:27:25 Age [y:d:h:m:s]: 10:051:07:31:28
Block: 47056 Fee (per_kB): 0.200000000000 (0.379259259259) Tx size: 0.5273 kB
Tx version: 1 No of confirmations: 2589276 RingCT/type: no
Extra: 017ea54a72b5472c011d6814fd2f80a4be16cfa09e67ee7b338ec88ce391b47015

2 output(s) for total of 4.400000000000 xmr

stealth address amount amount idx tag
00: fe13c0760e17b6a1d552ba3bac03821db3e7acc15f28aaa59d4329297e9d77b4 0.400000000000 6404 of 79936 -
01: c81c6ef4058b0f1e7c4c2805ac4961d6d2abcf45aefbdc61a9fc8d34fc9989e0 4.000000000000 214 of 110825 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-10-12 03:11:07 till 2014-10-12 05:21:55; resolution: 0.00 days)

  • |____________________________________________________________________________________________*_____________________________________________________________________________|
  • |______________________________________________________________________________*___________________________________________________________________________________________|
  • |____________________________________________________________________________________________*_____________________________________________________________________________|
  • |______________________________________________________________________________*___________________________________________________________________________________________|

4 inputs(s) for total of 4.600000000000 xmr

key image 00: d9e6eaca140ae2662c5ddefbd620e7e6917fd91a716a580cb307991e8d0c899c amount: 0.300000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9e73462ace4f715d4dcd8eea73967fe7a1d0ad1d697754555515eaa14cf586fb 00047045 1 19/34 2014-10-12 04:21:55 10:051:07:36:58
key image 01: 3d2af1d76805dbec35e0cc266c1639b76c9fad6a45cebe5f943588eaac587c89 amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 392743a5c4ff9eac730bdd9ecfc3bfecd851a5e7ef4283eee10bff64bb14aaf8 00047027 1 20/39 2014-10-12 04:11:07 10:051:07:47:46
key image 02: f38aab7e58d38d449f3120d5abf89895800d69943d821786a55541f81507cbe2 amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 50da5014d01197a7a4684f2f08c1527bee9ec178631b1102044b7b16c608db2a 00047045 1 19/34 2014-10-12 04:21:55 10:051:07:36:58
key image 03: d30d7e29d73e6a8a4e14fdc45056460b0687c27c961e192a62a7a3e8b9746036 amount: 0.300000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4d3a94a5589caef868f7e57bfe59e1f20456495efd7510943535d41ab9496a70 00047027 1 20/39 2014-10-12 04:11:07 10:051:07:47:46
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 300000000000, "key_offsets": [ 6424 ], "k_image": "d9e6eaca140ae2662c5ddefbd620e7e6917fd91a716a580cb307991e8d0c899c" } }, { "key": { "amount": 2000000000000, "key_offsets": [ 466 ], "k_image": "3d2af1d76805dbec35e0cc266c1639b76c9fad6a45cebe5f943588eaac587c89" } }, { "key": { "amount": 2000000000000, "key_offsets": [ 475 ], "k_image": "f38aab7e58d38d449f3120d5abf89895800d69943d821786a55541f81507cbe2" } }, { "key": { "amount": 300000000000, "key_offsets": [ 6420 ], "k_image": "d30d7e29d73e6a8a4e14fdc45056460b0687c27c961e192a62a7a3e8b9746036" } } ], "vout": [ { "amount": 400000000000, "target": { "key": "fe13c0760e17b6a1d552ba3bac03821db3e7acc15f28aaa59d4329297e9d77b4" } }, { "amount": 4000000000000, "target": { "key": "c81c6ef4058b0f1e7c4c2805ac4961d6d2abcf45aefbdc61a9fc8d34fc9989e0" } } ], "extra": [ 1, 126, 165, 74, 114, 181, 71, 44, 1, 29, 104, 20, 253, 47, 128, 164, 190, 22, 207, 160, 158, 103, 238, 123, 51, 142, 200, 140, 227, 145, 180, 112, 21 ], "signatures": [ "7d0fa6efba25720f484e6ffdb61bd01197a48df157024b13146a44e8c78d90039d15925e02317344cd2abb18c4fe00633d966ddb1159d8e7c3372bf25b276f06", "e392af3d3d0311f2ec75c48ead723ba42628f7ab03df1d6add07e01969095e05e93e6f562fd8ec4715e2bced87f5d31470f3d5f31de9f58dc76d5e519ecbea0c", "2d795035824e60d63b191481d226c328074cb6c9d1afeadd9c6f0f889a36660bfe470ba423bbe483429f36543a876fd30318323c5291ebaff23a365324e6440f", "166afaf8798f4ed0bae7fc8198eae31e0cd3480f6025391515ed78b3df0a9f0117cd168b85d7647300be792fea057320453a093490d2f09f6a5f0cd22cd32d08"] }


Less details
source code | explorer version (api): master-2023-03-28-d669720 (1.2)