Tx hash: 068706ee06bfd6ee8d3367376944267cb8471a66f95e513c8bacd678e1a581ee

Tx prefix hash: 4883a555ce2f37b70f3808994d7b44a25169066e3258023d3b6b566630fe465c
Tx public key: b95de082410a10b5e73d0c16d79d103fbbeeedc5919eac1665e09917f052f237
Timestamp: 1513417343 Timestamp [UCT]: 2017-12-16 09:42:23 Age [y:d:h:m:s]: 08:138:23:56:17
Block: 69819 Fee: 0.000001 Tx size: 0.3730 kB
Tx version: 1 No of confirmations: 3917197 RingCT/type: no
Extra: 01b95de082410a10b5e73d0c16d79d103fbbeeedc5919eac1665e09917f052f237

4 output(s) for total of 0.01 ETNX

stealth address amount amount idx
00: 0045ac2749596d9c80b05a9bae71874a76a28ae858fcd804f214b246ec4249a3 0.01 150130 of 523290
01: 3f2a8818760453006b43881aae056981611bcb8b3fe57527d5428a6e25534808 0.00 55976 of 613163
02: 36bd1ba9fde069b92e4cde91d4bc0cb93aabe05dcc99d180cfcffdf9f23f185a 0.00 833346 of 2003140
03: ff84cd2e4a437e8b717e52af352e25a4f0432549571f25886dce32a05cd1bd07 0.00 312129 of 968489

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-16 08:21:05 till 2017-12-16 10:28:32; resolution: 0.000521 days)

  • |__________________________________________________________________________________________*_______________________________________________________________________________|
  • |________________________________________________________________________________*_________________________________________________________________________________________|

2 inputs(s) for total of 0.01 etn

key image 00: ce8b0b1335d741844669bdd2a46d6956d664e5b38b5905b05b2868aaf6083487 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 54f0cc603e8765fd09bf23601ad1a6d8d00a25ed759c8f7b960c51f191815784 00069805 1 9/6 2017-12-16 09:28:32 08:139:00:10:08
key image 01: 33f998de947ed6caae6431918a14502a7d3bbbc0a2b32fd284ecd2db5a7ef23f amount: 0.01
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 87d6b51d38fe535884a7e2cb31ff9790948cc743869dafaee194628962cdfa20 00069800 1 6/6 2017-12-16 09:21:05 08:139:00:17:35
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 4, "key_offsets": [ 61047 ], "k_image": "ce8b0b1335d741844669bdd2a46d6956d664e5b38b5905b05b2868aaf6083487" } }, { "key": { "amount": 9000, "key_offsets": [ 160848 ], "k_image": "33f998de947ed6caae6431918a14502a7d3bbbc0a2b32fd284ecd2db5a7ef23f" } } ], "vout": [ { "amount": 8000, "target": { "key": "0045ac2749596d9c80b05a9bae71874a76a28ae858fcd804f214b246ec4249a3" } }, { "amount": 3, "target": { "key": "3f2a8818760453006b43881aae056981611bcb8b3fe57527d5428a6e25534808" } }, { "amount": 200, "target": { "key": "36bd1ba9fde069b92e4cde91d4bc0cb93aabe05dcc99d180cfcffdf9f23f185a" } }, { "amount": 800, "target": { "key": "ff84cd2e4a437e8b717e52af352e25a4f0432549571f25886dce32a05cd1bd07" } } ], "extra": [ 1, 185, 93, 224, 130, 65, 10, 16, 181, 231, 61, 12, 22, 215, 157, 16, 63, 187, 238, 237, 197, 145, 158, 172, 22, 101, 224, 153, 23, 240, 82, 242, 55 ], "signatures": [ "adc314da6f56e09a908e5979d96917bf54ad8ce0d2ff40ddef1efa79bb8afc0782f69e7083319bd5041b07861f2853d5681a3b14272ed5a9fea9125dfbaf2d01", "af16db35f8b4bc5f285df052d23305a8995498e2d5e07b650f8f4d111fe98f0b5cb94fe3214f697dc285d9fa2d11b56407ff179537e5fe1116142ed1fb25ce0a"] }


Less details