Tx hash: 0ea97d2bd97b0b8f0bd589a9927e096f5f861314930328934f1dfbdee50074a7

Tx prefix hash: e4d7dabf7d1189fdc069f262f1b3b51b10c7e967b8c5475e5d0b31e6f1e603c0
Tx public key: 390ef8aff92dfd69b04f5d2ce07149f0846c5a22cbfd5aadc5872c880f081a49
Timestamp: 1527537205 Timestamp [UCT]: 2018-05-28 19:53:25 Age [y:d:h:m:s]: 07:340:23:16:10
Block: 305448 Fee: 0.000002 Tx size: 0.4053 kB
Tx version: 1 No of confirmations: 3682115 RingCT/type: no
Extra: 01390ef8aff92dfd69b04f5d2ce07149f0846c5a22cbfd5aadc5872c880f081a49

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: f5307f8eae4f931d6e2961f320cfa1fef4ad17fda33d565df60ef4fe21206ca0 0.00 7183761 of 7257418
01: 1e6fa65b453afb964495ec54d42fb78b26ffd93b15e217c85e2b21579ceba183 0.00 937022 of 948726

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-05-26 02:37:01 till 2018-05-26 04:37:01; resolution: 0.000490 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|

3 inputs(s) for total of 0.00 etn

key image 00: b49946e42e3e95f5b0e429a0237e8c4b8f5450f6af4906858655a6fba6d96148 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e41172faa47916a9cdc50f1f7bc149a540a53cd16bcf7f0dc671a2d918405fe7 00301552 1 3/119 2018-05-26 03:37:01 07:343:15:32:34
key image 01: 4e61b13c3da163fd1a040d470c159358098f2283dfbcb81c7a5139b0a1b6dcc8 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: db957b750c2dfb4a81c4fa628d75e59d7339ae0131212c07836d4e7a9d41096b 00301552 1 3/119 2018-05-26 03:37:01 07:343:15:32:34
key image 02: aa36b36aa55fd129da763a009005cab73e4a5f279fd2655886b6a9b7d8f9f084 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 45a4a8b2ece23f870d5be707e63a7e795abd267fcfe1c8779800a40d7b421e13 00301552 1 3/119 2018-05-26 03:37:01 07:343:15:32:34
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 2, "key_offsets": [ 607189 ], "k_image": "b49946e42e3e95f5b0e429a0237e8c4b8f5450f6af4906858655a6fba6d96148" } }, { "key": { "amount": 20, "key_offsets": [ 909069 ], "k_image": "4e61b13c3da163fd1a040d470c159358098f2283dfbcb81c7a5139b0a1b6dcc8" } }, { "key": { "amount": 1000, "key_offsets": [ 7021941 ], "k_image": "aa36b36aa55fd129da763a009005cab73e4a5f279fd2655886b6a9b7d8f9f084" } } ], "vout": [ { "amount": 1000, "target": { "key": "f5307f8eae4f931d6e2961f320cfa1fef4ad17fda33d565df60ef4fe21206ca0" } }, { "amount": 20, "target": { "key": "1e6fa65b453afb964495ec54d42fb78b26ffd93b15e217c85e2b21579ceba183" } } ], "extra": [ 1, 57, 14, 248, 175, 249, 45, 253, 105, 176, 79, 93, 44, 224, 113, 73, 240, 132, 108, 90, 34, 203, 253, 90, 173, 197, 135, 44, 136, 15, 8, 26, 73 ], "signatures": [ "39e9cad8f0f771d684d012f7139ae8f0400ad99033ff8c7b3457b23419dde80895c2d258993a730653842d5f8aec1fa7d05a04d92010ded1e73554d38878dc02", "59346b2fed80fa1926103955bae05b3a4ee9630c1c234fac44b414c160fd1a04304bd57d2b276b4409e0ba5b35d8c3bfeae4a0f089c907c8d7e28758603d5905", "e5c23152f178fe95174b11a064d5fd8b57678a674ee18de9bb39edbf578a980347a062ab6158881b0fe94240e0d977a12d3edc94ce78f12fc70c957f4ae37e0e"] }


Less details