Tx hash: 07b20ec14530db4af55102974f759ec6620e47283fae88f28eb5a00ff07e352c

Tx prefix hash: 2e52419ca663e76488fc1c39659446edcfe369c157ae55eb23df98eef004a5d0
Tx public key: fed2aacca4e3672e5188809782bef720c6dc3696f8dbace8886d3d4bad9886b2
Timestamp: 1512681967 Timestamp [UCT]: 2017-12-07 21:26:07 Age [y:d:h:m:s]: 08:146:06:36:15
Block: 57476 Fee: 0.000001 Tx size: 0.3730 kB
Tx version: 1 No of confirmations: 3927822 RingCT/type: no
Extra: 01fed2aacca4e3672e5188809782bef720c6dc3696f8dbace8886d3d4bad9886b2

4 output(s) for total of 0.01 ETNX

stealth address amount amount idx
00: 2bcf762a6bea2b408e5b51dc854ed5ac370728b9e8eb63a760290ee3fa646d23 0.00 332813 of 1331469
01: bd2a8b952784405ddcf930b49874e09ebbd39ddb6ca20c01bc0bbeab2384e3be 0.00 332814 of 1331469
02: 1df045014b5e671e1cb61dcd447be3465bcaa5f590774d9d1b66edc17f604ae1 0.00 29216 of 613163
03: e293523587e87e5fc5f43702cf5590942fafa5e6dd535d9e22181a07904f1199 0.01 91454 of 523290

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-07 20:10:46 till 2017-12-07 22:15:08; resolution: 0.000508 days)

  • |________________________________________________________________________________________*_________________________________________________________________________________|
  • |__________________________________________________________________________________*_______________________________________________________________________________________|

2 inputs(s) for total of 0.01 etn

key image 00: 61fbb3d9b8cf8504a385086128ddeecab86de293ac274fa90342195b513d7906 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 79d7667d3cc3590cf85f99d722b0bb4f8787460d4948eb505c115c75eb587bc8 00057463 1 7/6 2017-12-07 21:15:08 08:146:06:47:14
key image 01: c2ad677d87e23671a54755b16185f64729615a2253ba0e1b2a11004523aef074 amount: 0.01
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9aec1dd6873e8b5a3ed32e1e6c348d6a30d8e827c1efa9b3551e31a93e422f57 00057458 1 7/7 2017-12-07 21:10:46 08:146:06:51:36
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 4, "key_offsets": [ 32760 ], "k_image": "61fbb3d9b8cf8504a385086128ddeecab86de293ac274fa90342195b513d7906" } }, { "key": { "amount": 9000, "key_offsets": [ 89515 ], "k_image": "c2ad677d87e23671a54755b16185f64729615a2253ba0e1b2a11004523aef074" } } ], "vout": [ { "amount": 500, "target": { "key": "2bcf762a6bea2b408e5b51dc854ed5ac370728b9e8eb63a760290ee3fa646d23" } }, { "amount": 500, "target": { "key": "bd2a8b952784405ddcf930b49874e09ebbd39ddb6ca20c01bc0bbeab2384e3be" } }, { "amount": 3, "target": { "key": "1df045014b5e671e1cb61dcd447be3465bcaa5f590774d9d1b66edc17f604ae1" } }, { "amount": 8000, "target": { "key": "e293523587e87e5fc5f43702cf5590942fafa5e6dd535d9e22181a07904f1199" } } ], "extra": [ 1, 254, 210, 170, 204, 164, 227, 103, 46, 81, 136, 128, 151, 130, 190, 247, 32, 198, 220, 54, 150, 248, 219, 172, 232, 136, 109, 61, 75, 173, 152, 134, 178 ], "signatures": [ "396d9bd17b03a18e085832dce0e2435c431613ff795df66fc572b8a8eb4bb70d168df40950b45d1f1173512f6bf5a023f75bc621e05908f6f94f0c4e263fd603", "27a61ef85becde3e2ff8eea29aa545281fada81d4f34551d96ecb24cebea250c25c9e9987f0897fcc057ea2bc2fdf43d15d363bdfc4cd5949152b5734ba91009"] }


Less details