Tx hash: 030241570ef0ead4b58ef08673915939ddef340727845c32096dcfbdabb100f3

Tx prefix hash: 15b29f3ea53d501473878a99459c211cf200b624a4887c97073de955ece34155
Tx public key: a0e5def00718df3caee32a6647835625361a9e3c30e0da90242b29fe4ed9f04d
Timestamp: 1513399187 Timestamp [UCT]: 2017-12-16 04:39:47 Age [y:d:h:m:s]: 08:139:14:32:29
Block: 69507 Fee: 0.000002 Tx size: 0.4062 kB
Tx version: 1 No of confirmations: 3918058 RingCT/type: no
Extra: 01a0e5def00718df3caee32a6647835625361a9e3c30e0da90242b29fe4ed9f04d

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: c0045c9953b793e31020df9861a2e32f12bb41e8acffc514c27683f2baf89112 0.00 335754 of 1012165
01: 3b9264156dacbae8830da157408c4aa63d463357183a8d1bc653af882f1bb119 0.00 459446 of 1331469

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-16 03:24:35 till 2017-12-16 05:32:02; resolution: 0.000521 days)

  • |__________________________________________________________________________________________*_______________________________________________________________________________|
  • |________________________________________________________________________________*_________________________________________________________________________________________|
  • |__________________________________________________________________________________________*_______________________________________________________________________________|

3 inputs(s) for total of 0.00 etn

key image 00: afffca809ce0ebcd2138d7b40c33c4b7d0a55d251a0f30bfec871fc0fc07c727 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 2677ef4943570e94a61e741cb04e67996e9d3b59e78d8fb63af9855b5de7b333 00069497 1 12/4 2017-12-16 04:32:02 08:139:14:40:14
key image 01: af25756fb559645cf472293e1d65f1062a09471bc8aaee425aff90e1b4b41b9d amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: dcd08f69acb73edceebeb86cb25615e0a7f7467e7b0436f96c121d597515fe9e 00069490 1 5/6 2017-12-16 04:24:35 08:139:14:47:41
key image 02: bd22e91c0611bfd020bfd6aa8e5572bfd2fcaffc874131a08d4c1da342e7409e amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f23648439eeb4dcea2be9861a8f141fe1021207993b9cd063b356cb4e7f77c82 00069496 1 1/6 2017-12-16 04:31:51 08:139:14:40:25
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 2, "key_offsets": [ 52698 ], "k_image": "afffca809ce0ebcd2138d7b40c33c4b7d0a55d251a0f30bfec871fc0fc07c727" } }, { "key": { "amount": 400, "key_offsets": [ 444149 ], "k_image": "af25756fb559645cf472293e1d65f1062a09471bc8aaee425aff90e1b4b41b9d" } }, { "key": { "amount": 800, "key_offsets": [ 309760 ], "k_image": "bd22e91c0611bfd020bfd6aa8e5572bfd2fcaffc874131a08d4c1da342e7409e" } } ], "vout": [ { "amount": 700, "target": { "key": "c0045c9953b793e31020df9861a2e32f12bb41e8acffc514c27683f2baf89112" } }, { "amount": 500, "target": { "key": "3b9264156dacbae8830da157408c4aa63d463357183a8d1bc653af882f1bb119" } } ], "extra": [ 1, 160, 229, 222, 240, 7, 24, 223, 60, 174, 227, 42, 102, 71, 131, 86, 37, 54, 26, 158, 60, 48, 224, 218, 144, 36, 43, 41, 254, 78, 217, 240, 77 ], "signatures": [ "d85f7f76232ad39dca239f50481117b0b37141f9fc3d417cb320bae71280670354403ef26aac7a0d31c96118060f2aa3b51f4edec1a6bcf9b55cca49f4efe506", "278db5031bac0e2ad0cc57e3ee0f92fdb489bd751a3fb437f26d13e728b8480f200211a1d65dfab1e630b8d71a492fbac4fcfb13f3f05eb73fccafe204374f0e", "1b92cd1ff1813212cab296f3e7ad348735154606e34a880fc44374315ed13d01249f811477aa18a0654ab5c04a1edd463f7ea685ff7908ac49822932cc51450c"] }


Less details