Onion Monero Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: 9b09db069a5a3d4ca123b9d7a72ae5b360b6c7360008f09dddcccdaafc34be24

Tx prefix hash: 71699c16926123a411b1990f6e18aef2763cd80dbcb3d4c804aa1ad8817c60a6
Tx public key: 16de3e6cf2ac45d267548354dc9879a90efc3820b92e64ba3d7d343c1f43d4b4
Timestamp: 1573195134 Timestamp [UTC]: 2019-11-08 06:38:54 Age [y:d:h:m:s]: 04:323:00:13:57
Block: 1337971 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1045 kB
Tx version: 2 No of confirmations: 1251954 RingCT/type: yes/0
Extra: 0116de3e6cf2ac45d267548354dc9879a90efc3820b92e64ba3d7d343c1f43d4b402146d696e65786d722e636f6d110600000000000100

1 output(s) for total of 4.974913500269 xmr

stealth address amount amount idx
00: 57e79259f350c7d1796a678d72e5bed19555dd8dec40bddbdb7322cf6ea338e2 4.974913500269 654378 of 0

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



{ "version": 2, "unlock_time": 1338031, "vin": [ { "gen": { "height": 1337971 } } ], "vout": [ { "amount": 4974913500269, "target": { "key": "57e79259f350c7d1796a678d72e5bed19555dd8dec40bddbdb7322cf6ea338e2" } } ], "extra": [ 1, 22, 222, 62, 108, 242, 172, 69, 210, 103, 84, 131, 84, 220, 152, 121, 169, 14, 252, 56, 32, 185, 46, 100, 186, 61, 125, 52, 60, 31, 67, 212, 180, 2, 20, 109, 105, 110, 101, 120, 109, 114, 46, 99, 111, 109, 17, 6, 0, 0, 0, 0, 0, 1, 0 ], "rct_signatures": { "type": 0 } }


Less details
source code | explorer version (api): devel-2022-05-11-3462ede (1.2) | monero version: 0.17.0.0-8349cfe4a