Tx hash: 04ea459ab98768b8f7fd7b1c624754aef938624cc5e959681645e7c8850473d6

Tx prefix hash: 6c8f25879f5b57b341853ef258a92a978919b5d555b8d13565269cc74d6592fd
Tx public key: ef8e791a818ffa98fde03dcd9a3fcc2a4bdf5aeb5dfa7f3984da277002d53ad5
Timestamp: 1527550155 Timestamp [UCT]: 2018-05-28 23:29:15 Age [y:d:h:m:s]: 07:349:12:08:06
Block: 305661 Fee: 0.000002 Tx size: 0.4062 kB
Tx version: 1 No of confirmations: 3694017 RingCT/type: no
Extra: 01ef8e791a818ffa98fde03dcd9a3fcc2a4bdf5aeb5dfa7f3984da277002d53ad5

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 8fb4c8bc24ee0a73e60f3c38ca997066470f1a51deb45cf37da9fd4fff4cfbbf 0.00 680628 of 685326
01: b1e84ed1ee4a924da4c6a587a28c5dd26e0bee8163394bc8783184aa386ee4b5 0.00 1007726 of 1012165

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-28 08:14:42 till 2017-12-28 10:14:42; resolution: 0.000490 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|

3 inputs(s) for total of 0.00 etn

key image 00: c7e715db16eeb085b5da23749b8af101835dc4d027ee68e9e24d4bb0b21d9cee amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: af44e5e3baeb7641d81e8370531b3f66576dfbff2e8225a1953a34dce84cebff 00087134 5 3/6 2017-12-28 09:14:42 08:136:02:22:39
key image 01: a7a6fd1f68bc7f633d7ebf2ceac8b2c7b82738fb001ddad6be47cce391510c5b amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8b0c1d851320207622bc2c8ea0c79d9950c5032920026804a4b60baf60a2905c 00087134 5 3/6 2017-12-28 09:14:42 08:136:02:22:39
key image 02: f2f1b135ba57e2aa2e5bd3fa47cbdcd8934a0a891b249f1509cc9eab25c04da8 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: de2e01aef97010388c351dcfdf4fd168f3afdd77e47b222e4c6c315efc613bba 00087134 5 3/6 2017-12-28 09:14:42 08:136:02:22:39
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 2, "key_offsets": [ 90317 ], "k_image": "c7e715db16eeb085b5da23749b8af101835dc4d027ee68e9e24d4bb0b21d9cee" } }, { "key": { "amount": 4000, "key_offsets": [ 293037 ], "k_image": "a7a6fd1f68bc7f633d7ebf2ceac8b2c7b82738fb001ddad6be47cce391510c5b" } }, { "key": { "amount": 700, "key_offsets": [ 444152 ], "k_image": "f2f1b135ba57e2aa2e5bd3fa47cbdcd8934a0a891b249f1509cc9eab25c04da8" } } ], "vout": [ { "amount": 4000, "target": { "key": "8fb4c8bc24ee0a73e60f3c38ca997066470f1a51deb45cf37da9fd4fff4cfbbf" } }, { "amount": 700, "target": { "key": "b1e84ed1ee4a924da4c6a587a28c5dd26e0bee8163394bc8783184aa386ee4b5" } } ], "extra": [ 1, 239, 142, 121, 26, 129, 143, 250, 152, 253, 224, 61, 205, 154, 63, 204, 42, 75, 223, 90, 235, 93, 250, 127, 57, 132, 218, 39, 112, 2, 213, 58, 213 ], "signatures": [ "7fd2cd82ca32f075529de10f5ba16b5f89e9f03b3ff6e6224c2129850b8bd70c06dae59296696bb7f2105fea15561da439c3c7075acf9ab731039f2cfa8cce0f", "8f034512e54d7038ac3ff57cdd877fc9083af687ea727fb962eda2a7562dbf061e0bd531606332dab912138ff2f3f01b13cafb11eb9e4587053ca216e9f3f803", "5b00a1ffcf117d2a8d421cdd28899b5eb806ab61209946326962d07665be500e77d1d4e73b54993599f92214036ddd4cbfcd4ecbe3d5060f0119fb07e9f00e09"] }


Less details