Tx hash: 0f2ae4bf868f6d4b434fd1590f1bcec1644ff2aa40877a8992dd9b17d460627c

Tx prefix hash: 76a79c40689fd8dcb6822fa1d6ef16d9ca07428b6fa611cfe070845c76e3fcd4
Tx public key: f6cb626a3d050ec054163081bda953aac153178aa6a8b635c981e84884bf4251
Timestamp: 1512653851 Timestamp [UCT]: 2017-12-07 13:37:31 Age [y:d:h:m:s]: 08:147:17:49:52
Block: 56869 Fee: 0.000001 Tx size: 0.3721 kB
Tx version: 1 No of confirmations: 3930019 RingCT/type: no
Extra: 01f6cb626a3d050ec054163081bda953aac153178aa6a8b635c981e84884bf4251

4 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 51fc792e1acd901fd78cb24cfdf34f125e455841d25fa1984fd277157b28252b 0.00 407105 of 1493847
01: e1f15cb320a9a80d0bc2c8fe6f8f307faa5e17b7259600e5240316d535ef205a 0.00 145037 of 1027483
02: 7d90d407ddbae35b5a9bfee8128d945447f772d887866103cfd6b5d21681eb84 0.00 99424 of 1204163
03: c9b40ba3e7d7b521ec8ddc20c18cd4d77b818b49da1c69858a4bf9434f9508be 0.00 225732 of 1012165

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-07 12:26:29 till 2017-12-07 14:27:36; resolution: 0.000495 days)

  • |____________________________________________________________________________________*_____________________________________________________________________________________|
  • |______________________________________________________________________________________*___________________________________________________________________________________|

2 inputs(s) for total of 0.00 etn

key image 00: 2d247da040c4fba00b5279928c292b5acdedd95a6a8d54466185e7a4c5e0dc8f amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: fe3cd09f59d8105ebdb230887e4de918b9fcf51a04f30d776f79130db0b9af25 00056854 1 1/4 2017-12-07 13:26:29 08:147:18:00:54
key image 01: 52111400185a480a0b492b99afcda39266919173de06883dc3b56b6d04fd7577 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d838b7ef24cae175c1a0c717bdf5dcaacbcff060e3b30f068c06e1215a452150 00056856 1 8/5 2017-12-07 13:27:36 08:147:17:59:47
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 90, "key_offsets": [ 191622 ], "k_image": "2d247da040c4fba00b5279928c292b5acdedd95a6a8d54466185e7a4c5e0dc8f" } }, { "key": { "amount": 1000, "key_offsets": [ 1085876 ], "k_image": "52111400185a480a0b492b99afcda39266919173de06883dc3b56b6d04fd7577" } } ], "vout": [ { "amount": 300, "target": { "key": "51fc792e1acd901fd78cb24cfdf34f125e455841d25fa1984fd277157b28252b" } }, { "amount": 80, "target": { "key": "e1f15cb320a9a80d0bc2c8fe6f8f307faa5e17b7259600e5240316d535ef205a" } }, { "amount": 9, "target": { "key": "7d90d407ddbae35b5a9bfee8128d945447f772d887866103cfd6b5d21681eb84" } }, { "amount": 700, "target": { "key": "c9b40ba3e7d7b521ec8ddc20c18cd4d77b818b49da1c69858a4bf9434f9508be" } } ], "extra": [ 1, 246, 203, 98, 106, 61, 5, 14, 192, 84, 22, 48, 129, 189, 169, 83, 170, 193, 83, 23, 138, 166, 168, 182, 53, 201, 129, 232, 72, 132, 191, 66, 81 ], "signatures": [ "4aecae92546cbbbe73719eda52c74af1ca6df1d556d8500779d4170745eae00f30ea68658caf7b59a48ef4ff2e3cc201b564790e6d1ec8a445844c8a1c09da01", "13f06ff92f948f76ed2d20989eab6fa32f4f9aa153233dd9dd01b3db02a5af0d6a269e3780e162afe6e1f57c7cd85cc3c3502debce5c8aaba84fd6910705f90d"] }


Less details