Tx hash: 19f5ae97aa69ed606a4b8fa4f4f3e0e02399f215e4e2e0842413b97b48b91328

Tx prefix hash: ec153e9a63e001cbbea74b817cd4f74d52bf2181680ee6e192a2fd70b968675f
Tx public key: 1bc3eb1e0557343b1a13d82533d6f2add2234d87856c788bd58ec1abb50ed1d3
Timestamp: 1513692175 Timestamp [UCT]: 2017-12-19 14:02:55 Age [y:d:h:m:s]: 08:139:16:06:53
Block: 74373 Fee: 0.000001 Tx size: 0.3047 kB
Tx version: 1 No of confirmations: 3918028 RingCT/type: no
Extra: 011bc3eb1e0557343b1a13d82533d6f2add2234d87856c788bd58ec1abb50ed1d3

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: ec1423cbe643654bbbd5acb013b9e7712c43b6bc9800d616f19b8bcdeae711b2 0.00 72232 of 619305
01: 4f42c740eb78851f56f5a277efea3eb2cf3d5ed5ee3a7901ed89f20aba0c7602 0.00 371705 of 1012165

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-19 07:19:27 till 2017-12-19 09:33:45; resolution: 0.000549 days)

  • |____________________________________________________________________________*_____________________________________________________________________________________________|
  • |______________________________________________________________________________________________*___________________________________________________________________________|

2 inputs(s) for total of 0.00 etn

key image 00: c0c4bd444715a9311ef592dcf5aab6392a76b407f052e565bc128336434297ac amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5306e525be76e47d931d8f79f1126c20266be36def1ac4840c41b8a98b4b1ae5 00073999 1 3/4 2017-12-19 08:19:27 08:139:21:50:21
key image 01: 4d5cdec5b79512e42e1b05a5a687c3531273b54ad8db020bd4b089c1b7d74130 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1edc2e824cca79732eb98767f6463e1df00b47b4dbd4cfad75ff55cbc45a919f 00074010 1 4/5 2017-12-19 08:33:45 08:139:21:36:03
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 700, "key_offsets": [ 369123 ], "k_image": "c0c4bd444715a9311ef592dcf5aab6392a76b407f052e565bc128336434297ac" } }, { "key": { "amount": 5, "key_offsets": [ 78528 ], "k_image": "4d5cdec5b79512e42e1b05a5a687c3531273b54ad8db020bd4b089c1b7d74130" } } ], "vout": [ { "amount": 4, "target": { "key": "ec1423cbe643654bbbd5acb013b9e7712c43b6bc9800d616f19b8bcdeae711b2" } }, { "amount": 700, "target": { "key": "4f42c740eb78851f56f5a277efea3eb2cf3d5ed5ee3a7901ed89f20aba0c7602" } } ], "extra": [ 1, 27, 195, 235, 30, 5, 87, 52, 59, 26, 19, 216, 37, 51, 214, 242, 173, 210, 35, 77, 135, 133, 108, 120, 139, 213, 142, 193, 171, 181, 14, 209, 211 ], "signatures": [ "fd784189628e1b121ec5c5c4c11c2cd9f96b2a86b6ec9f44873e7e63de454b027e584404e9592ce7a9996f8f2bfb15217877acc24c59b56796ac6780d102f70e", "8a517c3ddef45e8cc7d30c510053d70a899ca512c84c24f75d81b0094a5bb102b8bf0dcfaa1439c40841dea13d8fefb568113be0d4dfcb0e7b0f1c4a54b1d00c"] }


Less details