Tx hash: 0ffc6393e6dfa7814d1675e3f81609dd424ed0c1cbcb100f7e7cb30065cad26c

Tx prefix hash: 66a041609f0f05123e0bf87292c492d72ea1cd2034e05e43c1a75156d62119e2
Tx public key: eb23703c84573688b5aeeaf8871d79a0a5ba52b8af342e3b536eb8c09bc1bc0f
Timestamp: 1523415325 Timestamp [UCT]: 2018-04-11 02:55:25 Age [y:d:h:m:s]: 08:023:04:28:36
Block: 236153 Fee: 0.000001 Tx size: 0.4326 kB
Tx version: 1 No of confirmations: 3750731 RingCT/type: no
Extra: 01eb23703c84573688b5aeeaf8871d79a0a5ba52b8af342e3b536eb8c09bc1bc0f

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 40c13c67fc760b591cb87c03afac914941597dfbd397aed7da8705f437561cf7 0.00 640841 of 918752
01: 10f6291f7451a6bace8a85ae9118ab0a413dee8a994671e7471e6e14ea16aaf1 0.00 923918 of 1488031

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-01-17 11:38:41 till 2018-04-10 08:51:47; resolution: 0.487554 days)

  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |_______________________________________________________________________________________________________________________________________________________________________**_|

2 inputs(s) for total of 0.00 etn

key image 00: 7de7f8632c2ba6ca2d633dc5193199652139c5f73b7d3572f8952572dcdf2aa6 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6f1f5a5e8047b2f227a9a9738517573d04cc36237ab792bee0525392e715e9d6 00116159 1 1/9 2018-01-17 12:38:41 08:106:18:45:20
- 01: c26a6041fb6b209fdcf247ea7521b0dd90390a738a8d319f0fc8e9fa81365acc 00234962 5 1/3 2018-04-10 07:51:47 08:023:23:32:14
key image 01: 6afde356f41b358f299999ffe6961bd0086679cc5b955918c4d17fb0907c246d amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: be0e99da8d817635f93984da793c463cbde1530df5ddef3f268edcff7e036f62 00233306 5 1/3 2018-04-09 02:37:52 08:025:04:46:09
- 01: bdf973d7ad5b1825c5f15aeb475c5cf707bd1e8cd31e0e1d865bf404b634b3ca 00234335 5 3/85 2018-04-09 19:39:10 08:024:11:44:51
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 9, "key_offsets": [ 496171, 363414 ], "k_image": "7de7f8632c2ba6ca2d633dc5193199652139c5f73b7d3572f8952572dcdf2aa6" } }, { "key": { "amount": 9, "key_offsets": [ 853070, 4358 ], "k_image": "6afde356f41b358f299999ffe6961bd0086679cc5b955918c4d17fb0907c246d" } } ], "vout": [ { "amount": 7, "target": { "key": "40c13c67fc760b591cb87c03afac914941597dfbd397aed7da8705f437561cf7" } }, { "amount": 10, "target": { "key": "10f6291f7451a6bace8a85ae9118ab0a413dee8a994671e7471e6e14ea16aaf1" } } ], "extra": [ 1, 235, 35, 112, 60, 132, 87, 54, 136, 181, 174, 234, 248, 135, 29, 121, 160, 165, 186, 82, 184, 175, 52, 46, 59, 83, 110, 184, 192, 155, 193, 188, 15 ], "signatures": [ "e877923150ed96e70775d47df2038d325412b84c7d5b24e4d56233e6038c000e9b6221901623df25f9e41bd7668940589439e6a649bf6e34d0b6f31ae666db0d99cb4e19d48843652de26c181d811c43f97cca7795b269db2aab4d855be0df02fc29d627aec1547e3eb195bc66ebdbe782caacda80fbde5144f804fff920d00b", "d1b8f7c4f7142d15d487198252a17ebe1818bbf6c2a3f565559bca5f0f48440620d2b30677b2c515d86ae4a804e33b86736f7239ab30c2cea47afadce746c10d997c2e666a0c7e9718c37ac61f689b98ae9d05768b5c0e32d04155bc10c28a03c51f3b59a1dcbb5657477eb0a7ffc17e53ca4ba62cbf8f9e7eca9d74c06a3901"] }


Less details