Tx hash: 0b6270be5b7b82db82bd24df180e00d48d1c48538c941f8038db47054235bd92

Tx prefix hash: 0a1ee0297f697fd635c2535db9d32670dd2a0a0e2c992ba283e1e4b5c0964ff6
Tx public key: 997863b94dc7aefc93de94ccd3098ee606a3368f8b7c820eb94c52f7de3dab0f
Timestamp: 1512457579 Timestamp [UCT]: 2017-12-05 07:06:19 Age [y:d:h:m:s]: 08:149:00:05:04
Block: 54195 Fee: 0.000001 Tx size: 0.4053 kB
Tx version: 1 No of confirmations: 3931286 RingCT/type: no
Extra: 01997863b94dc7aefc93de94ccd3098ee606a3368f8b7c820eb94c52f7de3dab0f

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 3fd80e12e1e54a45d230aab7cd2145fdba1f84a2566afbe1efa3b671ba3a78ac 0.00 186834 of 1252607
01: c30c0186b03f02511824ac46693d31f037ae0af03b6fdad9495c511088e3b69f 0.00 74814 of 862456

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-05 05:49:32 till 2017-12-05 07:49:32; resolution: 0.000490 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|

3 inputs(s) for total of 0.00 etn

key image 00: c386023ba02b8f9081617272a74c1912619575aea33020561f060a5b07df0c06 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6118eea0ec79829230fa74bef023ea2ae6711c248d8b204c9b8348a13c8220ee 00054182 1 1/6 2017-12-05 06:49:32 08:149:00:21:51
key image 01: 6968c47f442b986315dc1d977c41d0dfcd08ea819b2f05871336da4190017840 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 11ff3f3c839c95f7bf6cea12f2bda51cf34fdd66070fd98a78df920adc0ea78f 00054182 1 1/6 2017-12-05 06:49:32 08:149:00:21:51
key image 02: 14900d230d1ad211a0870edf03ec93655ba2a8efc696f24b3fffd80e6d966336 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 43e686864577451f29e93ca5676eaf58fcecadab9ff147c4ee296ef6803ad401 00054182 1 2/6 2017-12-05 06:49:32 08:149:00:21:51
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 400, "key_offsets": [ 292736 ], "k_image": "c386023ba02b8f9081617272a74c1912619575aea33020561f060a5b07df0c06" } }, { "key": { "amount": 9, "key_offsets": [ 75032 ], "k_image": "6968c47f442b986315dc1d977c41d0dfcd08ea819b2f05871336da4190017840" } }, { "key": { "amount": 500, "key_offsets": [ 302249 ], "k_image": "14900d230d1ad211a0870edf03ec93655ba2a8efc696f24b3fffd80e6d966336" } } ], "vout": [ { "amount": 900, "target": { "key": "3fd80e12e1e54a45d230aab7cd2145fdba1f84a2566afbe1efa3b671ba3a78ac" } }, { "amount": 8, "target": { "key": "c30c0186b03f02511824ac46693d31f037ae0af03b6fdad9495c511088e3b69f" } } ], "extra": [ 1, 153, 120, 99, 185, 77, 199, 174, 252, 147, 222, 148, 204, 211, 9, 142, 230, 6, 163, 54, 143, 139, 124, 130, 14, 185, 76, 82, 247, 222, 61, 171, 15 ], "signatures": [ "48d1c6aa88cfdace5241eae08e5d57272fd4a6ede76503f523ec744ff476c601677c1ae0b735647732d7be40c321f105cf7b3022ef991fb5499b78b128034c0e", "412b8874b9218c04368b48703e402b31674ea9ffd8cbcb60a57512390a5cde02bcdc86d7e2908288e93fc12989c78163c716aabf79063c254d3341225a329b0c", "6a8bb65ddd5ea764122292979f5e874a0fdfdb946b86b589d12d6289d0b2e50d2074ef10dd69fafd2a6eec9db56344618169ae12cfd1404d94fc2979acbdde07"] }


Less details