Tx hash: 04ac357f9280362a1852d3dfd4fb34596faa6c4c63209f42fe4efbadc26aa15e

Tx prefix hash: e0e53b01d8a855c2a028afe63e3618febe2d73e6b99f49addc2d69e880e2c062
Tx public key: 0b8c7ff1dbcc4e6553ee94a86b27f9979dbbd00dbe0d5695d0f948c55da673fc
Timestamp: 1525874237 Timestamp [UCT]: 2018-05-09 13:57:17 Age [y:d:h:m:s]: 07:363:16:21:24
Block: 277559 Fee: 0.000002 Tx size: 0.4385 kB
Tx version: 1 No of confirmations: 3714852 RingCT/type: no
Extra: 010b8c7ff1dbcc4e6553ee94a86b27f9979dbbd00dbe0d5695d0f948c55da673fc

2 output(s) for total of 0.90 ETNX

stealth address amount amount idx
00: 1087d719810ee44f832bfa26f1b5bd9d1aef677768e21827f752a95278e9ead8 0.80 55956 of 66059
01: 2d9fda868704197fe1a1e9af7a0c51eca4629d8bae3918c00fa4d29203106573 0.10 303760 of 379867

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-04-28 07:33:13 till 2018-05-09 14:34:59; resolution: 0.066429 days)

  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |_______________________________________________________________________________________________________________________________________________________________________*_*|

2 inputs(s) for total of 0.90 etn

key image 00: 7751166171add840a2ef34bef06fea250417e818c515916632ac7ddfe464bea6 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b03d93276fca1ab6e4f704f30ac9a3e0ac4a31e4773c49ab0ef9073cf924c03c 00261348 5 1/84 2018-04-28 08:33:13 08:009:21:45:28
- 01: 781df37a8cfd4077bcc87bd368f94b30f68a3ffd98075b41992471702f205a1b 00277544 2 5/6 2018-05-09 13:33:47 07:363:16:44:54
key image 01: 133669857f783be50419fedee7ffe2c1af78419d94562c2aa8040cead2c85809 amount: 0.90
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7d79aaba96200a2ecb0c5ec080d0532e38e9bf62f219eef1e86f4f732d420156 00277467 2 8/7 2018-05-09 10:55:41 07:363:19:23:00
- 01: 80943ca29b73b23c28db9a7e27a3c92835ada14cb3784c4a0f21d49aac4d17ef 00277548 2 4/6 2018-05-09 13:34:59 07:363:16:43:42
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 2, "key_offsets": [ 434033, 41906 ], "k_image": "7751166171add840a2ef34bef06fea250417e818c515916632ac7ddfe464bea6" } }, { "key": { "amount": 900000, "key_offsets": [ 80185, 295 ], "k_image": "133669857f783be50419fedee7ffe2c1af78419d94562c2aa8040cead2c85809" } } ], "vout": [ { "amount": 800000, "target": { "key": "1087d719810ee44f832bfa26f1b5bd9d1aef677768e21827f752a95278e9ead8" } }, { "amount": 100000, "target": { "key": "2d9fda868704197fe1a1e9af7a0c51eca4629d8bae3918c00fa4d29203106573" } } ], "extra": [ 1, 11, 140, 127, 241, 219, 204, 78, 101, 83, 238, 148, 168, 107, 39, 249, 151, 157, 187, 208, 13, 190, 13, 86, 149, 208, 249, 72, 197, 93, 166, 115, 252 ], "signatures": [ "7ec5ca81e2cbe836dd926668e7bbaf3f8389528518dd9263587699169f71d503bf8bb33fe6ee6c33a8f5b38da2f769ea7f6ec4c98fb464fe2753925a8c4a25078891e7a3e58822240029b2675e61d86bf81aec32ddc1ed3b38471cb8571585044f158eb530f2c40d11062a51d4c1dfd5a64151aefe8b304cf8c4154bd60ae805", "c1688e1e974e0551b6c871d3de24060ba32149d08c576dd62358a1d51f2799052cc97fbe4af64f43e6da2c9e406eac2223bf96691c443286683a81c61e1ad601124f6545be368946460b5b31a40f2eec82efa24024d09e8b2d96efe062c85a0bee2cb1b78f1f6541ff5f288670a850aec24a1180f766ef33b18962ddb52e5f00"] }


Less details