Tx hash: 0057af81690d5984e8272cfa7cdaef1b2d00058b13b4fe9a1cbad13a973bd09c

Tx prefix hash: 38abeffa19f39294da46d9a41a941220f858aab53e671c6dc184dee591f0ec88
Tx public key: 071537fe79c9eed0aa64bc1f5cc2580be7bf421a77735337310f2af8885941b8
Timestamp: 1512348755 Timestamp [UCT]: 2017-12-04 00:52:35 Age [y:d:h:m:s]: 08:152:23:46:26
Block: 52406 Fee: 0.000001 Tx size: 0.3730 kB
Tx version: 1 No of confirmations: 3936870 RingCT/type: no
Extra: 01071537fe79c9eed0aa64bc1f5cc2580be7bf421a77735337310f2af8885941b8

4 output(s) for total of 0.01 ETNX

stealth address amount amount idx
00: a534eede0cca363c3fb8ddfc9126ba86d9193f6657c59ce9aec821f9c5628c51 0.00 293644 of 1331469
01: 39bf31e0b8fa5664141ecc23d50c719a27b5e9a7efa5883c5b04d2d20dc56fec 0.01 74178 of 523290
02: 73c7922cc0419df9ade58e8c6f618863e8045782982eef904439d23511a3782b 0.00 71175 of 862456
03: 2b1e3eed80d0d19981382dbadb915a2875eef318e5284c8262cc94129de99a56 0.00 293645 of 1331469

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-03 23:38:09 till 2017-12-04 01:38:09; resolution: 0.000490 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|

2 inputs(s) for total of 0.01 etn

key image 00: a446713bf092b9d1e9480f1298da9c2796b49de4b64f850cbbd0c9d1c9ac1ba0 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 532c61c6ad5ae653ff0a1c5059b34fc29345b2d1725f402ff56bf1e9d165a018 00052390 1 1/5 2017-12-04 00:38:09 08:153:00:00:52
key image 01: d068fc6ac69d56c8ec2d8b0d4d3f54da20af0162048f5851c7241766fd1f8192 amount: 0.01
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6f96442cbd3fb3bfadd8ac7e4d9b65c352fc8abb371dbec697e87884e8326311 00052390 1 2/6 2017-12-04 00:38:09 08:153:00:00:52
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 9, "key_offsets": [ 68848 ], "k_image": "a446713bf092b9d1e9480f1298da9c2796b49de4b64f850cbbd0c9d1c9ac1ba0" } }, { "key": { "amount": 9000, "key_offsets": [ 72785 ], "k_image": "d068fc6ac69d56c8ec2d8b0d4d3f54da20af0162048f5851c7241766fd1f8192" } } ], "vout": [ { "amount": 500, "target": { "key": "a534eede0cca363c3fb8ddfc9126ba86d9193f6657c59ce9aec821f9c5628c51" } }, { "amount": 8000, "target": { "key": "39bf31e0b8fa5664141ecc23d50c719a27b5e9a7efa5883c5b04d2d20dc56fec" } }, { "amount": 8, "target": { "key": "73c7922cc0419df9ade58e8c6f618863e8045782982eef904439d23511a3782b" } }, { "amount": 500, "target": { "key": "2b1e3eed80d0d19981382dbadb915a2875eef318e5284c8262cc94129de99a56" } } ], "extra": [ 1, 7, 21, 55, 254, 121, 201, 238, 208, 170, 100, 188, 31, 92, 194, 88, 11, 231, 191, 66, 26, 119, 115, 83, 55, 49, 15, 42, 248, 136, 89, 65, 184 ], "signatures": [ "53a52ed2264dc36a683c58ed89bd0b0d2d4312f4aa48fa1b9a1214beaab67e0a00977d40ec78a990ac6cb1ce603b26e95f4850ed3902b9d87f192f2cbff9dd0a", "c38e062cd880c61745681859a209704e7ae24cf493c9d1b1f0796ff0ed5a67054c9e5bf6b8e5c03fbc17ed96b40d1f7f0ca92b6da20e33c6606f86bc425a560e"] }


Less details