xmrchain.net & Explore.Moneroworld.com

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Solo mine on your own blockchain to support the monero network!

Monero Block Frequency Tool || Monero Website || Make Monero Better!

~~~~Monero Bounties~~~~

Monero Testnet Explorer || Monero Stagenet Explorer

i2p links: exchanged.i2p

Why so ugly? Monero FAQ

Moneroblocks Explorer || Monerohash explorer || Map of Monero Network

For a pretty version of this explorer with javascript. NOTE - this doesn't work when I turn the API off. I AM IN CONTROL OF THE DRUM MACHINE.

Don't use the API

NOTE: This explorer actively tests beta software in production. If it crashes, hooray! We found a bug! Please find a backup explorer for these instances.

The most up to date software for Monero are version: CLI v0.18.3.4, GUI v0.18.3.4

If you need to use a remote node, you should set up your own.

High Fee Bug. Remote nodes can increase your tx fees. Double check before sending. Run your own node.

Autorefresh is OFF

Tx hash: 05619bc1daace77c46ff6a823363c37b87e1060c1fdeb8e05c0ee181c8188f97

Tx public key: 9c873717748aca288fcbd847efc6a7f0a5cb4c70876dede3a58178f467c69436
Payment id (encrypted): 805da26903bc2f0e
Timestamp: 1740761264 Timestamp [UTC]: 2025-02-28 16:47:44 Age [y:d:h:m:s]: 00:042:03:53:06
Block: 3357649 Fee (per_kB): 0.000058020000 (0.000020480000) Tx size: 2.8330 kB
Tx version: 2 No of confirmations: 30311 RingCT/type: yes/6
Extra: 019c873717748aca288fcbd847efc6a7f0a5cb4c70876dede3a58178f467c69436020901805da26903bc2f0e

2 output(s) for total of ? xmr

stealth address amount amount idx tag
00: 04d314838c5466ef429f37d20f834d1b460df2586538f06365102ad8900f24d7 ? 126864865 of 129824409 <ba>
01: d34bf9e72ac6e87a39a5fa44de2628c2fec45322c7a3155919b4fc72f3f38832 ? 126864866 of 129824409 <ed>

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



3 input(s) for total of ? xmr

key image 00: c8c3facd796fc0863e0b092480af4196dad0bb32b509f35856107a401cc61f84 amount: ?
ring members blk
- 00: afc5dde9fab590eb69d6eefc2e31cb65d93377762e22a4a3c70b81731f64be3e 03308121
- 01: 8a77a00ff7ac797fad917b3a3b1d12566e1ca5a5af91dd532a5abd296db77250 03342936
- 02: 0afc65aaafd3f8fcfd8f90f3fc61792c2c01cd97714b914de8b8eac54032eebe 03349526
- 03: 58100fbf7e7a434b51f3153570d498860068c18cf412a356f1b3e59e658fdabc 03356541
- 04: d057bdd5304eec6d3652cd9f87c6ded8cccf812cd8e81529669b613b506b3c37 03356873
- 05: 207a5e1f6c126d2d32b81518d895dcaa35757039d418de6ff42ea0aaa2cd5c17 03357363
- 06: be989713f19d3c2243808986d0c875b294ad3a72a9cd0c5109f9aee88d697610 03357386
- 07: b753c730ff4248de267defa5a6de8a4f4b6e46f2baac8bee53c04ce481c98baa 03357432
- 08: 52bc6b62212c7f518d2179af31bd01b123c73ff205754d79f64d0997ee45bb0d 03357479
- 09: 9fe336593e48ea7e0375c78ac1920ffcbb0c193bb619ad9fa9bf50ab5658ad19 03357545
- 10: 552d5a958ff19c6dc87ba3d2d7f2d57c5e04112ab8b5a2f0fb2d00070e8d8800 03357573
- 11: 119149a1bffc935867d59ff16e3e6b16f5d04cffc960e8f4ab0d081d15c367ba 03357579
- 12: b55c1df54a6d5ad19094f390791fb2c3f9d2cb1b8ba677acbd832d321d327ff5 03357613
- 13: 454835835d9ae95097121c1675a3f893bc8234dd084970d1095b96433c8f1bdf 03357618
- 14: ac3bfd834639651fd1ea94c08578448e7cad8613e081d0762c7e94094a14f77e 03357623
- 15: 5d5957ceb08758310027f1a8aa10af2ddafc5c9c506e88d37c65ef2a7e078217 03357632
key image 01: 7468e1bf5e33cc2927a609b34a41226cca8778cbed984ab7fb758e461a5a688d amount: ?
ring members blk
- 00: 405e0429a0272e93eff7919f9d977273720ac02d203fddd8e42fc74aa25c9a72 03302714
- 01: 82e38565fa9cae4433f71433ae37f1180d30472f4684a28c773ea42d9960fa4b 03348016
- 02: 3dfde11902b6a41e1c959444dc6cbe581e0e3f5c5c710e986f09eaed8ec4596b 03351805
- 03: 7e3961b353b60d2761c6c2b555e74ad8a92deb04db6c185d8662626f4e7c373f 03352203
- 04: 7e917f8600feaf8f19305bc916de54f3e22241af0b37cebeb9bb97bea3422caa 03352999
- 05: f7329b03a2bea4cf5c7cc46b8e5c7679b134f53c79aed8e70950b66577f39e36 03353898
- 06: 88a3ecd7783606ecd71c9a633b5522e0cd72459ed6f131f784b47df53df4d225 03355231
- 07: a59da06c1ec784fdd01654ecda658a7bb57ba8b059767ed67d42ccdb8c27dbfb 03356233
- 08: 577ddcbb5d79d83cb888ea5a2874e42d6d2acdef926f7b89b4bb4d305f8c7df1 03356261
- 09: 55311587eea6da89dfcac1d6b7ab666ed6dc4e85ae6e02fd8dfbaecb9d664984 03357095
- 10: c81387ecf668f90c1491c3338f471d50eea2be88069ebf63b08ca452850b62e6 03357490
- 11: 78ca3b2471804d4ca76816cb23822b84996dd626e1c58c60eeee84a1e1047926 03357510
- 12: 2ce5eaf0e865e9af7636e8b17b5b2f5cfc6ebf851b3a7e6afd517cfb8eac0c38 03357516
- 13: 78f1e057cb0e75cba3d0f7f833770c01dd7108460dfac034c0e341f6a689d675 03357541
- 14: e2d569efae25e337377924620f53696473f955ca41289aa50130c96147cb2807 03357554
- 15: ffce6502079721a569458bdbd9f18795563f2ec1a24c0ffd23b33fdc0bc2ce8c 03357621
key image 02: 0f2e70cd2ae406c2c6199ed20aa6a3fef36c1d6e7000175de8abf66888728748 amount: ?
ring members blk
- 00: fd550c39ba1fb4d0f91887174c123147bead7dc7cb3e7d7b37fda64a7cf2fc57 03319127
- 01: 21c04fc8bef04a7908ca56fc4d06d4f196b00ef4ae6e80c32a601f3c86ec6b14 03341425
- 02: 25113e436fd4c88b23ead7007f80ad399819ccd8d886d5b7d5dcaba4311be050 03345162
- 03: 905648224afedd2addc3c7c86d97532153d6d8cbbe32db6df665e1ad8e292825 03346166
- 04: 6c9c91e697447068a839acd9d5bc7dfbbf8ae009bc827fa478e55dc3e2c52d12 03351213
- 05: 90fe5996096857508447c4362349cc3823d6800d7a155592a131900c69444a07 03354971
- 06: 4b3a31fa313beafd38e6a3b91de873ffc6e9051cb482653e200edab32f68f265 03356542
- 07: 14242dcbb8d7ac16a98642ea723994a9e3778a4aa9bbe2ea64e56e002a06ae3b 03356652
- 08: 514a3480016716dec76401b0a899eee0c8e36c1f8d427ee2dfe533843fa76acb 03357337
- 09: 9ea114e2b14ec9e114dea331e3a89cbfb4b2748d787f47385da84d551d049379 03357381
- 10: c9514cf9fce42e66761c1eb030ce38697c44f237528172628eaa15198ddce4fa 03357451
- 11: 783d4e1c71423b47202c62c365b0cba6b83b08b4483157056dfeb7834220a55d 03357531
- 12: 9e076116831fe4900845af880e45b1f24c82ac821c5927239d3ddca65eb7a68a 03357572
- 13: dfc04c3e2c7324c11760ffd264dc72b3880b643559926ba00df60502798dd6c1 03357618
- 14: 928411f00a62e9c8f186e1ca18dd694a9fb83221e638ee6a596d4c6d98b20f6e 03357636
- 15: f247b3ddd4550e94dccc096c26932316a02acb2cf3913d998bd983e4a0ca0712 03357636
More details
source code | explorer version (api): devel-2024-08-14-0c4ec39 (1.2)