Tx hash: 139bd7cf13035a0e50d85ff888011f1a91c5a1b9dc3c313044b8da77d70b0a41

Tx prefix hash: 79668e0b18f1303d9dd33c4f71fdfef8f4fdeb15781ad999447119a3c9ff3d5d
Tx public key: 499ef072a9e7a5a36871dedb7bc585c8f697683d7f8aef2a63213b8a10497b40
Timestamp: 1512749562 Timestamp [UCT]: 2017-12-08 16:12:42 Age [y:d:h:m:s]: 08:156:19:17:47
Block: 58738 Fee: 0.000001 Tx size: 0.4053 kB
Tx version: 1 No of confirmations: 3942308 RingCT/type: no
Extra: 01499ef072a9e7a5a36871dedb7bc585c8f697683d7f8aef2a63213b8a10497b40

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 08ff2fe3375951437662f3f0e141624d0325598b46590c57e826ab1eca0dd50b 0.00 347556 of 1331469
01: cc17567ed62be00e01fed5d69364198a5ede50cd910c49c33c15d7066ccd763f 0.00 94699 of 862456

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-08 14:43:01 till 2017-12-08 16:56:57; resolution: 0.000547 days)

  • |____________________________________________________________________________*_____________________________________________________________________________________________|
  • |______________________________________________________________________________________________*___________________________________________________________________________|
  • |____________________________________________________________________________________*_____________________________________________________________________________________|

3 inputs(s) for total of 0.00 etn

key image 00: f9bff8a4b408b1e5cc7f81261084b9c2fe329976ae8f06d3306b68efea60e5f0 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: be0f0628d7de11e6a7702f69acf8e2c7be021dbb1acc56bf53a6acd0c27dd9f6 00058709 1 2/3 2017-12-08 15:43:01 08:156:19:47:28
key image 01: 7afb5f5d02cdc1a1377a6e60da2bb91b5d445d328736aac25d69e98b2d7780a3 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5e032f98649ca060d12968cdc4dfa3602e2077489364f82b77d3d1e659e71fd3 00058724 1 3/6 2017-12-08 15:56:57 08:156:19:33:32
key image 02: f0cc50d87217123a17d25a17901660c6e9ab5cfb5938607ad8e755a8b1e90822 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 40fbbe05882dd0d40b6ae7487d4a8899d486939db60cb1922df359add7257c05 00058715 1 6/5 2017-12-08 15:49:09 08:156:19:41:20
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 200, "key_offsets": [ 693181 ], "k_image": "f9bff8a4b408b1e5cc7f81261084b9c2fe329976ae8f06d3306b68efea60e5f0" } }, { "key": { "amount": 9, "key_offsets": [ 124375 ], "k_image": "7afb5f5d02cdc1a1377a6e60da2bb91b5d445d328736aac25d69e98b2d7780a3" } }, { "key": { "amount": 300, "key_offsets": [ 429663 ], "k_image": "f0cc50d87217123a17d25a17901660c6e9ab5cfb5938607ad8e755a8b1e90822" } } ], "vout": [ { "amount": 500, "target": { "key": "08ff2fe3375951437662f3f0e141624d0325598b46590c57e826ab1eca0dd50b" } }, { "amount": 8, "target": { "key": "cc17567ed62be00e01fed5d69364198a5ede50cd910c49c33c15d7066ccd763f" } } ], "extra": [ 1, 73, 158, 240, 114, 169, 231, 165, 163, 104, 113, 222, 219, 123, 197, 133, 200, 246, 151, 104, 61, 127, 138, 239, 42, 99, 33, 59, 138, 16, 73, 123, 64 ], "signatures": [ "eea9ad3e36d921041f330b819c198a6de308c70f8efef6141e49571b8e83930f98dad0b59c5808bc237701b4816af0f15bf8b7472c8983d8f94e1fd5be46ec00", "848680e3bfd93889f3d61e198a4afb3f546a417a015d278a79951828fdedba0a3429e3bfb3b17355033575cc1d26d240912deb7a092ea8cd0c99e91293502907", "c218c8a3d39831e7f7c0b59665a853baafb9923744fe3c84efd0116fe016c70b9a4ef3ff27915a08966ba77604c615477c3d1d3785f63798c1bb46979f853009"] }


Less details