Tx hash: 1f859fc5478b4734e4f97540a333e2e81236f0156c50c55a82d24a708ec1bd2a

Tx prefix hash: 209c100a616cdecd28bb55880cd2f1cd8e4aeece0529de4f73d754a7f1ae958c
Tx public key: e1314b23b94aa80f169131ed6f8eca14d794c7ca2f2395b5ac3c90bd7e02d9bf
Timestamp: 1526348161 Timestamp [UCT]: 2018-05-15 01:36:01 Age [y:d:h:m:s]: 07:353:22:31:33
Block: 285606 Fee: 0.000001 Tx size: 0.4062 kB
Tx version: 1 No of confirmations: 3700872 RingCT/type: no
Extra: 01e1314b23b94aa80f169131ed6f8eca14d794c7ca2f2395b5ac3c90bd7e02d9bf

2 output(s) for total of 0.02 ETNX

stealth address amount amount idx
00: fe81f5a50254fcc7c27754d29134469caf28baac52b112945405efa2186a04a0 0.00 1021814 of 1204163
01: c728453e6d4a08c51ac2836fb5fc1b9d5de8c7533697b351d28fc6c772a69e6f 0.02 522211 of 592088

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-05-14 23:14:48 till 2018-05-15 02:16:42; resolution: 0.000743 days)

  • |__________________________________________________________________________________________________________________*_______________________________________________________|
  • |______________________________________________________________________________________________*___________________________________________________________________________|
  • |________________________________________________________*_________________________________________________________________________________________________________________|

3 inputs(s) for total of 0.02 etn

key image 00: eb050d18b0ce321e60cda94c690873cf0658fc96805050ae78bc3d0c9557d50f amount: 0.01
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6d2b6a26f335be38088d8b1592650285eb8bc4adf398ffef4ea498fa3574535c 00285576 1 3/8 2018-05-15 01:16:42 07:353:22:50:52
key image 01: 693640d233f4236f3b614b0c2a95dfacadd1e866b0a584bf28027af07e53c994 amount: 0.01
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f7e18aa7d0d4c6766de51861f617f4ca07d92684fd1bd6465339fa48370ab145 00285549 1 6/5 2018-05-15 00:55:01 07:353:23:12:33
key image 02: dcb07fdd054f178716174d071c76889dbf96b81df5ee2beabc3b8d1c2efabf17 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 180ffd07acc0455eca6455d9a7476e57241a1e5d45b058ef9ba44d303ab4a1eb 00285521 1 6/8 2018-05-15 00:14:48 07:353:23:52:46
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 10000, "key_offsets": [ 1343999 ], "k_image": "eb050d18b0ce321e60cda94c690873cf0658fc96805050ae78bc3d0c9557d50f" } }, { "key": { "amount": 10000, "key_offsets": [ 1343897 ], "k_image": "693640d233f4236f3b614b0c2a95dfacadd1e866b0a584bf28027af07e53c994" } }, { "key": { "amount": 10, "key_offsets": [ 1227615 ], "k_image": "dcb07fdd054f178716174d071c76889dbf96b81df5ee2beabc3b8d1c2efabf17" } } ], "vout": [ { "amount": 9, "target": { "key": "fe81f5a50254fcc7c27754d29134469caf28baac52b112945405efa2186a04a0" } }, { "amount": 20000, "target": { "key": "c728453e6d4a08c51ac2836fb5fc1b9d5de8c7533697b351d28fc6c772a69e6f" } } ], "extra": [ 1, 225, 49, 75, 35, 185, 74, 168, 15, 22, 145, 49, 237, 111, 142, 202, 20, 215, 148, 199, 202, 47, 35, 149, 181, 172, 60, 144, 189, 126, 2, 217, 191 ], "signatures": [ "3d2c268aa557e521bf0dcea9226daab79152f1bf8a184d70c9cfa6fa34ea570af712d28db628b3a17e60f208cc97450456b5dffc1daea51c01c01eda0236c40c", "19db54d5572a9361771f431d9a1965a27ef0403fc64016a202739ce95bbb7e0f2af173869ecab24a20df2ab87d83fa6d48ea52388c09f9d7c6917246adcda90d", "8c8ef0059ee12ed5d46b7120464fc7b3cbfe59363ed6949d35c1011b56e780034724aab3ea442bf9db314b19f3538aa434a20e3855434aa91ed08d480150c70e"] }


Less details