Tx hash: 0a346b20cb68d5cd07dec52467c39fec22589fb69094ae535ca6f1b9befd09a1

Tx prefix hash: f61f5307f7c38a5703245b3f6bce2b1f1a38b53c3af505b4b37a29bf64a8e9bc
Tx public key: dc14ffab9364a98d44ab18abb818028145d3fcc7eb4c13417cd482df66570c84
Payment id: bf46e534b63279f8cafa9811c523816b16e0bde6e24ff93e19531d39b7664762
Payment id as ascii ([a-zA-Z0-9 /!]): F42ykOS9fGb
Timestamp: 1513437824 Timestamp [UCT]: 2017-12-16 15:23:44 Age [y:d:h:m:s]: 08:137:21:24:08
Block: 70129 Fee: 0.000020 Tx size: 0.3408 kB
Tx version: 1 No of confirmations: 3915674 RingCT/type: no
Extra: 022100bf46e534b63279f8cafa9811c523816b16e0bde6e24ff93e19531d39b766476201dc14ffab9364a98d44ab18abb818028145d3fcc7eb4c13417cd482df66570c84

2 output(s) for total of 0.03 ETNX

stealth address amount amount idx
00: 834bb131990b354c3aa30c7ee0ddb72156e96acae2b8f3b8c0ae32be4486a7b7 0.03 104312 of 376908
01: 696792946eea085fba3820fc5afa77e24380363e16505c6a55fda8a098e4efec 0.00 161384 of 948726

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-13 02:15:09 till 2017-12-16 09:02:30; resolution: 0.019311 days)

  • |_______________________________________________________________________________________________________________________________________________________________________*__|
  • |___*______________________________________________________________________________________________________________________________________________________________________|

2 inputs(s) for total of 0.03 etn

key image 00: 46fefe154cf41014739633d3ee149aed9e09d2c715a82dc2186c8d600a990f22 amount: 0.03
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ab8a51cc7c078c08cd6875c895802c9092546a5987d1a7a7edcf48a2f65dceed 00069722 5 13/5 2017-12-16 08:02:30 08:138:04:45:22
key image 01: 21667834923307c99e87cdd6f70d0506887c08a52cb5c2602304273191da535b amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 35d26ab2186c0f284194c3d53d246b61371d3d8b05f5aa97a11a3656f4c37535 00065229 1 4/3 2017-12-13 03:15:09 08:141:09:32:43
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 30000, "key_offsets": [ 102997 ], "k_image": "46fefe154cf41014739633d3ee149aed9e09d2c715a82dc2186c8d600a990f22" } }, { "key": { "amount": 40, "key_offsets": [ 131871 ], "k_image": "21667834923307c99e87cdd6f70d0506887c08a52cb5c2602304273191da535b" } } ], "vout": [ { "amount": 30000, "target": { "key": "834bb131990b354c3aa30c7ee0ddb72156e96acae2b8f3b8c0ae32be4486a7b7" } }, { "amount": 20, "target": { "key": "696792946eea085fba3820fc5afa77e24380363e16505c6a55fda8a098e4efec" } } ], "extra": [ 2, 33, 0, 191, 70, 229, 52, 182, 50, 121, 248, 202, 250, 152, 17, 197, 35, 129, 107, 22, 224, 189, 230, 226, 79, 249, 62, 25, 83, 29, 57, 183, 102, 71, 98, 1, 220, 20, 255, 171, 147, 100, 169, 141, 68, 171, 24, 171, 184, 24, 2, 129, 69, 211, 252, 199, 235, 76, 19, 65, 124, 212, 130, 223, 102, 87, 12, 132 ], "signatures": [ "71bfe4ca1b5b931a15ea365da06fb38603c8910478b04e07db871559e4ed600c66c1c0a249fe8365d138b3476f86bc7e8f281f3b6c6bcdfc048efbe5b69b6602", "c5663cce2ba09d945944d555db48c14f5ddf8c0f8e923a7502d30ae250467a02dff298f1e7031ae080f779780aa1152834f0ed17f36d846501acbb330ad28202"] }


Less details