Tx hash: 06dfef3f7d20201bbf47da21c14c3593944fee8b16ebf29e27fadd1d9d337d98

Tx prefix hash: 864dfa73d95842118e071e75af66475728d6bfa023d3869da683b0c7524a3de9
Tx public key: 3a756e1345b873a651b5ad58f13059566b8fd32df051b67f8209052073a8a9cd
Timestamp: 1512445506 Timestamp [UCT]: 2017-12-05 03:45:06 Age [y:d:h:m:s]: 08:150:15:13:19
Block: 54012 Fee: 0.000001 Tx size: 0.3730 kB
Tx version: 1 No of confirmations: 3933545 RingCT/type: no
Extra: 013a756e1345b873a651b5ad58f13059566b8fd32df051b67f8209052073a8a9cd

4 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 1363cbc51549b7c4cd06087dd4c5d70deb639728ada562be8b4bd05b159dd00e 0.00 165625 of 1393312
01: fb294ceaecb840f6fcfb6a10856514bd16891ea1bd61f8161b77790966b11377 0.00 185289 of 968489
02: 296c8bf64bdde6e34de48f464e1113ebc5cc85471180f05dd9845f175f992647 0.00 238858 of 1089390
03: 5043ed7aca8329ddd91ef71f640da137b02c37186e2f827fea6d8150080d780d 0.00 74393 of 1204163

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-05 02:30:10 till 2017-12-05 04:30:10; resolution: 0.000490 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|

2 inputs(s) for total of 0.00 etn

key image 00: acaf18f2faca19b644403036e053e20d4f6db08c99645809c70a24221e41c26e amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7e36901f30faa8f48e932bee31cbc8707909a4f5df4d9d58edda1f46c07385af 00053992 1 2/5 2017-12-05 03:30:10 08:150:15:28:15
key image 01: 5bd282c38ae355310b11cc731ad56edec2ecc912e1569ac2e1f8f9fca6a49301 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 81cecc4ee4018e8a3c502e40fde9a59fb709e602646a4815118e18bb98d3525e 00053992 1 2/6 2017-12-05 03:30:10 08:150:15:28:15
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 500, "key_offsets": [ 301366 ], "k_image": "acaf18f2faca19b644403036e053e20d4f6db08c99645809c70a24221e41c26e" } }, { "key": { "amount": 1000, "key_offsets": [ 1006880 ], "k_image": "5bd282c38ae355310b11cc731ad56edec2ecc912e1569ac2e1f8f9fca6a49301" } } ], "vout": [ { "amount": 90, "target": { "key": "1363cbc51549b7c4cd06087dd4c5d70deb639728ada562be8b4bd05b159dd00e" } }, { "amount": 800, "target": { "key": "fb294ceaecb840f6fcfb6a10856514bd16891ea1bd61f8161b77790966b11377" } }, { "amount": 600, "target": { "key": "296c8bf64bdde6e34de48f464e1113ebc5cc85471180f05dd9845f175f992647" } }, { "amount": 9, "target": { "key": "5043ed7aca8329ddd91ef71f640da137b02c37186e2f827fea6d8150080d780d" } } ], "extra": [ 1, 58, 117, 110, 19, 69, 184, 115, 166, 81, 181, 173, 88, 241, 48, 89, 86, 107, 143, 211, 45, 240, 81, 182, 127, 130, 9, 5, 32, 115, 168, 169, 205 ], "signatures": [ "b17aa64ace39d73ddc28881b43db14098c0a0aab8873bfdafa34b7b728585f006f01ed30d96554b924d3545bd73eff67fa803e98702798ba0a0751034e624406", "06ac8b00731228dd542ac179feff34e6dd2dcd645a8ea16b5fd8d3bc0302d7029fb998f2ae0736614e024411993d7526089f4a7dfe7ca0603041a9ad7c8e6a0b"] }


Less details