Tx hash: 13e644e586145d033e163f607e73316b4fd79704a2a4f369830c706780ce6399

Tx prefix hash: 944007a77e36096cb1a611b4b65a8cd7838dd874ed622dd8ed18a97d666c5ad9
Tx public key: 61a71aea496ce585db843c0539c3424ba8f01dfa4b840bd087d8a2a97040ee79
Timestamp: 1512779234 Timestamp [UCT]: 2017-12-09 00:27:14 Age [y:d:h:m:s]: 08:151:07:40:05
Block: 59219 Fee: 0.000001 Tx size: 0.3721 kB
Tx version: 1 No of confirmations: 3934698 RingCT/type: no
Extra: 0161a71aea496ce585db843c0539c3424ba8f01dfa4b840bd087d8a2a97040ee79

4 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 84a5ec863bf4a4a5ce0dbb1718d29050844608742dc78406a1f8977151b8f633 0.00 250421 of 1012165
01: cbc42e0d98da7cabe286ced1f4a19e46d575276ab26b50f79c78c1a686d50220 0.00 495991 of 2212696
02: a0066fc5761a42099205fece909db4c22ebce2f48e7eb0c5459bedcd9cd2fcda 0.00 134241 of 1204163
03: 56c689e993f91df48c14532862cf829e95cb493e60497abb329b6f62fd8bb9bf 0.00 225328 of 1393312

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-08 22:59:21 till 2017-12-09 01:04:23; resolution: 0.000511 days)

  • |__________________________________________________________________________________*_______________________________________________________________________________________|
  • |________________________________________________________________________________________*_________________________________________________________________________________|

2 inputs(s) for total of 0.00 etn

key image 00: 4f211c3612f577b5998fa7f5987818ec39d260bebaa29dd67db01aa93df0385f amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5f15b4c06b24b857e6387b3cafa79d2e3a72e9842f0a157b7c7f0bc189fadd12 00059205 1 1/6 2017-12-08 23:59:21 08:151:08:07:58
key image 01: e6c0a0ce679ace9eb4b59127e2ad6b9fa7d914476372ef8d5700eb37d3a5b7b1 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d7f7591941c6a95140506f3e656ab1b55deb76a175c903b6f168afb82544e454 00059208 1 3/5 2017-12-09 00:04:23 08:151:08:02:56
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 400, "key_offsets": [ 342875 ], "k_image": "4f211c3612f577b5998fa7f5987818ec39d260bebaa29dd67db01aa93df0385f" } }, { "key": { "amount": 500, "key_offsets": [ 355592 ], "k_image": "e6c0a0ce679ace9eb4b59127e2ad6b9fa7d914476372ef8d5700eb37d3a5b7b1" } } ], "vout": [ { "amount": 700, "target": { "key": "84a5ec863bf4a4a5ce0dbb1718d29050844608742dc78406a1f8977151b8f633" } }, { "amount": 100, "target": { "key": "cbc42e0d98da7cabe286ced1f4a19e46d575276ab26b50f79c78c1a686d50220" } }, { "amount": 9, "target": { "key": "a0066fc5761a42099205fece909db4c22ebce2f48e7eb0c5459bedcd9cd2fcda" } }, { "amount": 90, "target": { "key": "56c689e993f91df48c14532862cf829e95cb493e60497abb329b6f62fd8bb9bf" } } ], "extra": [ 1, 97, 167, 26, 234, 73, 108, 229, 133, 219, 132, 60, 5, 57, 195, 66, 75, 168, 240, 29, 250, 75, 132, 11, 208, 135, 216, 162, 169, 112, 64, 238, 121 ], "signatures": [ "7cf32c74c5ad8955329edd913a3f0765896f15ebab3380e955e63018a947170b732f984a26220b3f7b38975450f1080e07afe0b2cba27c6c65af275035d3710a", "fd5b11f44359ddad080f892faf1fcf1fc9b031045c53a7ae61e4772decd5c20d22b2dd2fc4fab29821d16245687ed65ed4c92ab98fa480037be3157e356eca07"] }


Less details