Graft Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: 4608c3a59ef8ec5113d16891cc959698272a59406093b6a4d744d79338338775

Tx public key: 764c0993f5c711b2260a51289eff2261b0e1b87918155dd3c07e36b6537cd6c0
Timestamp: 1652374310 Timestamp [UCT]: 2022-05-12 16:51:50 Age [y:d:h:m:s]: 00:045:00:35:35
Block: 1127540 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.1006 kB
Tx version: 2 No of confirmations: 32019 RingCT/type: yes/0
Extra: 01764c0993f5c711b2260a51289eff2261b0e1b87918155dd3c07e36b6537cd6c002110000000193e39cf5000000000000000000

1 output(s) for total of 279.135783546300 grf

stealth address amount amount idx
00: 00f7a01c80a68b88c9dc827d8bd81a525ef26c84e6b66d577de5ad17e2ba7e3f 279.135783546300 13798374 of 0

Check which outputs belong to given Graft address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Graft in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



More details
source code | explorer version (api): randomx-2021-06-15-012b1cd (1.1) | graft version: 1.10.0-release