Graft Blockchain Explorer

(no javascript - no cookies - no web analytics trackers - no images - open sourced)

Autorefresh is OFF

Tx hash: 54985904c407ef58fdd7a61326f2ed79b16d91e43678ea26df1da2ba1862c12a

Tx prefix hash: 43c4fcd26a1257e9c51ed41f689da5a8aa9e1a86aac36e888c2ee1fe9443ada6
Tx public key: 8c22a8e910c70bfc0080d144c1a26e36a1459c4955a21eea0e031326446e0886
Timestamp: 1516009189 Timestamp [UCT]: 2018-01-15 09:39:49 Age [y:d:h:m:s]: 04:122:11:58:39
Block: 424 Fee (per_kB): 0.000000000000 (0.000000000000) Tx size: 0.0811 kB
Tx version: 2 No of confirmations: 1130128 RingCT/type: yes/0
Extra: 018c22a8e910c70bfc0080d144c1a26e36a1459c4955a21eea0e031326446e0886

1 output(s) for total of 1933.581061724200 grf

stealth address amount amount idx
00: 9ca55381a6ffc72002c9bd400d2b69c052abd6fa9ed92178aca896e1df7a0463 1933.581061724200 425 of 0

Check which outputs belong to given Graft address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Graft in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



{ "version": 2, "unlock_time": 484, "vin": [ { "gen": { "height": 424 } } ], "vout": [ { "amount": 19335810617242, "target": { "key": "9ca55381a6ffc72002c9bd400d2b69c052abd6fa9ed92178aca896e1df7a0463" } } ], "extra": [ 1, 140, 34, 168, 233, 16, 199, 11, 252, 0, 128, 209, 68, 193, 162, 110, 54, 161, 69, 156, 73, 85, 162, 30, 234, 14, 3, 19, 38, 68, 110, 8, 134 ], "rct_signatures": { "type": 0 } }


Less details
source code | explorer version (api): randomx-2021-06-15-012b1cd (1.1) | graft version: 1.10.0-release