Tx hash: 0aeb42323a2acac967c4f5f7d6fe1da0161c21c739cef58dffa2f5831e859c95

Tx prefix hash: 3a2416c4c8d647ba14862e32a9e879648bffa5d9514b7d35c9075dea89219269
Tx public key: b1c6bfe738d79910c75451d5c7797c82bd579b000d2a79bef402ddd20bebffeb
Timestamp: 1514145903 Timestamp [UCT]: 2017-12-24 20:05:03 Age [y:d:h:m:s]: 08:140:09:12:01
Block: 82037 Fee: 0.000001 Tx size: 0.4043 kB
Tx version: 1 No of confirmations: 3918660 RingCT/type: no
Extra: 01b1c6bfe738d79910c75451d5c7797c82bd579b000d2a79bef402ddd20bebffeb

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 8db79e5fbb47c72da1d5d3bcf64dc7e232be56adaed3df10f2b6a1b8d73c7a00 0.00 213118 of 862456
01: ba327a2e9d53cfcaced85004c3839e0ed6f4e7a1879f4dec48bbf33918082d23 0.00 561527 of 1331469

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-24 18:54:24 till 2017-12-24 20:56:13; resolution: 0.000498 days)

  • |______________________________________________________________________________________*___________________________________________________________________________________|
  • |____________________________________________________________________________________*_____________________________________________________________________________________|
  • |______________________________________________________________________________________*___________________________________________________________________________________|

3 inputs(s) for total of 0.00 etn

key image 00: 9824f1b4568660a28355202152d07b20cf71c9939005a3cabd9b7fce2cbb86ed amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3df151bd0248467cb1d8574443692c46f928b356d48b84ae78d9151793f50dbf 00082024 1 1/4 2017-12-24 19:56:13 08:140:09:20:51
key image 01: d014a58a20700ac6cdacb4f62bb558e9cbf18bcb97c10f961d77800dbbc1da0a amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: dbf5898f1d04746963a2ead4d35fc9be67f51edb86d0d628f1ab4fe0e93637c9 00082023 1 5/6 2017-12-24 19:54:24 08:140:09:22:40
key image 02: 1a90157365cdba30243693fc192e88b5476e9e164b2e6cf7632920bd78744b34 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3ef9c5817fe2001b2f4bf64223adc0fd45abb2d41a2742d2565e9bfc5f598a3d 00082024 1 5/4 2017-12-24 19:56:13 08:140:09:20:51
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 400, "key_offsets": [ 545502 ], "k_image": "9824f1b4568660a28355202152d07b20cf71c9939005a3cabd9b7fce2cbb86ed" } }, { "key": { "amount": 9, "key_offsets": [ 344763 ], "k_image": "d014a58a20700ac6cdacb4f62bb558e9cbf18bcb97c10f961d77800dbbc1da0a" } }, { "key": { "amount": 100, "key_offsets": [ 808631 ], "k_image": "1a90157365cdba30243693fc192e88b5476e9e164b2e6cf7632920bd78744b34" } } ], "vout": [ { "amount": 8, "target": { "key": "8db79e5fbb47c72da1d5d3bcf64dc7e232be56adaed3df10f2b6a1b8d73c7a00" } }, { "amount": 500, "target": { "key": "ba327a2e9d53cfcaced85004c3839e0ed6f4e7a1879f4dec48bbf33918082d23" } } ], "extra": [ 1, 177, 198, 191, 231, 56, 215, 153, 16, 199, 84, 81, 213, 199, 121, 124, 130, 189, 87, 155, 0, 13, 42, 121, 190, 244, 2, 221, 210, 11, 235, 255, 235 ], "signatures": [ "b7cc6faa0a5384050bdd627bbbd43d542d9f3ca60a9e2805f1e1c6f1445f3f0bc354f68d2b5dacb172131a4911536bb23bd1109ef32f32e9251612cf77cc6c0d", "b04c8ab0f913c0817754602275d7563b4fa162f607196cd1a52863b2285ef70a4e5cd28a7a7997d2d0d48345a5fd648995117dc4657cd4d34eac346e04ec870d", "f683766d9784eb010f736d07d027b7a1b902329b214276fa6e21ddeb4b32530e72fbbc41f43ef7df4a7be7b18f6a84f4318aff3a048d4e7bb6c2a9ea71fce705"] }


Less details