Tx hash: 0f671992d650564c7fff4ff47138515f84cb7a68273c831d9af1161b1898daed

Tx prefix hash: 04a82af7d5132d98ac07da0b6cd80e66fab85303956976c4dbf519b8e0c41997
Tx public key: 9e67568de78fa35d5c3c35c2de39e8affd81ab60317e0b463ecf52cbf79e2879
Timestamp: 1513279094 Timestamp [UCT]: 2017-12-14 19:18:14 Age [y:d:h:m:s]: 08:138:17:57:08
Block: 67303 Fee: 0.000001 Tx size: 0.3730 kB
Tx version: 1 No of confirmations: 3917139 RingCT/type: no
Extra: 019e67568de78fa35d5c3c35c2de39e8affd81ab60317e0b463ecf52cbf79e2879

4 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 8b16e24a3cdfbba45fd0cdc8b8a6ee030921a47b59affe06e5dcaf323e1d48c8 0.00 318509 of 1012165
01: d02cb08902c4ba24740f80ba0d596ffe476a1753ec1b171246765446aac2b19f 0.00 321677 of 1393312
02: 98b5cfc58708d5719cc647c9afdb4a8bcefcaa8428a3e11517b0c1eef0107de9 0.00 525608 of 1493847
03: 7c4ca4b065fdb873630dc01d0b08dd6737eaeb3a27453a0eacdf12c02186e944 0.00 229568 of 1204163

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-14 18:08:14 till 2017-12-14 20:10:44; resolution: 0.000500 days)

  • |_______________________________________________________________________________________*__________________________________________________________________________________|
  • |___________________________________________________________________________________*______________________________________________________________________________________|

2 inputs(s) for total of 0.00 etn

key image 00: 4b98e3c40cfb315977ba9f75074a0923861aa65ca68cf2af9a6ebe4d58a8dc13 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b87fd052d1982eed4035f1dfe7a9173c7311728d1598bc5ec8cf97b2b6e2d0ce 00067288 1 3/4 2017-12-14 19:10:44 08:138:18:04:38
key image 01: 8cd32e168fb23da6f27d25e3bdea9c503054dbcafe0546ebeb602872fac8cdf5 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c6e96a466333a12e2a2f21adc3d8e65aa3b0effd264a431a66398a56d3c20be0 00067285 1 6/8 2017-12-14 19:08:14 08:138:18:07:08
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 400, "key_offsets": [ 423307 ], "k_image": "4b98e3c40cfb315977ba9f75074a0923861aa65ca68cf2af9a6ebe4d58a8dc13" } }, { "key": { "amount": 700, "key_offsets": [ 318331 ], "k_image": "8cd32e168fb23da6f27d25e3bdea9c503054dbcafe0546ebeb602872fac8cdf5" } } ], "vout": [ { "amount": 700, "target": { "key": "8b16e24a3cdfbba45fd0cdc8b8a6ee030921a47b59affe06e5dcaf323e1d48c8" } }, { "amount": 90, "target": { "key": "d02cb08902c4ba24740f80ba0d596ffe476a1753ec1b171246765446aac2b19f" } }, { "amount": 300, "target": { "key": "98b5cfc58708d5719cc647c9afdb4a8bcefcaa8428a3e11517b0c1eef0107de9" } }, { "amount": 9, "target": { "key": "7c4ca4b065fdb873630dc01d0b08dd6737eaeb3a27453a0eacdf12c02186e944" } } ], "extra": [ 1, 158, 103, 86, 141, 231, 143, 163, 93, 92, 60, 53, 194, 222, 57, 232, 175, 253, 129, 171, 96, 49, 126, 11, 70, 62, 207, 82, 203, 247, 158, 40, 121 ], "signatures": [ "0512ec51f2d272858c59296641cef550b008f1292bd210d19d6fc695c7c719016e5ae0280a7b9e56904650658708502b1d43afd9a327de77627d047bd9465000", "b82ad66fa6ecb9b73724b29c130d6f1a976c5d7a8113620d40007d18b3eda4096218ac823f1007973385204d2da8371ff96113e87081fffa0503ba3ce581e003"] }


Less details