Tx hash: 21eac4f156aa177e64ebdcaf7ea94b34a954429430df5739c02a32d5b93dc1a8

Tx prefix hash: b6351e7be91f7c86c1a235fe822695369fb011d9377e09623cfc29bb747f0444
Tx public key: 3dbdde1378f140a667f9ab910ab213c16d72fd2fcecaedd3d050152585acea8e
Timestamp: 1526570445 Timestamp [UCT]: 2018-05-17 15:20:45 Age [y:d:h:m:s]: 07:352:07:56:54
Block: 289309 Fee: 0.000002 Tx size: 0.4385 kB
Tx version: 1 No of confirmations: 3698500 RingCT/type: no
Extra: 013dbdde1378f140a667f9ab910ab213c16d72fd2fcecaedd3d050152585acea8e

2 output(s) for total of 0.70 ETNX

stealth address amount amount idx
00: aecf714ffd373ea17388ae9e735260227b11c3e68e4b9236eaf97629d646cd1f 0.10 344941 of 379867
01: c9b90643d579f4249534680c22acf0d33692e15de069a75d5804b51788b90c40 0.60 280912 of 297169

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-01-05 04:52:16 till 2018-05-17 15:15:02; resolution: 0.779015 days)

  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 0.70 etn

key image 00: 0112504db7ba7f72db45c0c4c9ff3ac0833badc34d2121f760ec19a11571461f amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c79dff0d92305cd8b9ff6a5fe9f724f4e550165992d69e8f4140e3efcdeaddb6 00288374 5 3/6 2018-05-16 23:32:18 07:352:23:45:21
- 01: d87bc2fce754e38f3c896436e09022ec84578c52a4a9db892b237d77ecaf17ed 00289218 2 11/6 2018-05-17 14:15:02 07:352:09:02:37
key image 01: 946010c19ec90297bcbb60e273aaf9febdeed8a994326a7f0cb943b227cb3f83 amount: 0.70
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 57f7a562a495c8b1d4cd1eeb060dbca991b08a1ec8ed7f648491aca00fd1252d 00098412 0 0/6 2018-01-05 05:52:16 08:119:17:25:23
- 01: 60bf637fa7734c0f6a2304e994200b8c0ccbe4382d9b55288154da48d7bcda1b 00289153 2 6/6 2018-05-17 13:21:03 07:352:09:56:36
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 2, "key_offsets": [ 523373, 5631 ], "k_image": "0112504db7ba7f72db45c0c4c9ff3ac0833badc34d2121f760ec19a11571461f" } }, { "key": { "amount": 700000, "key_offsets": [ 123918, 71765 ], "k_image": "946010c19ec90297bcbb60e273aaf9febdeed8a994326a7f0cb943b227cb3f83" } } ], "vout": [ { "amount": 100000, "target": { "key": "aecf714ffd373ea17388ae9e735260227b11c3e68e4b9236eaf97629d646cd1f" } }, { "amount": 600000, "target": { "key": "c9b90643d579f4249534680c22acf0d33692e15de069a75d5804b51788b90c40" } } ], "extra": [ 1, 61, 189, 222, 19, 120, 241, 64, 166, 103, 249, 171, 145, 10, 178, 19, 193, 109, 114, 253, 47, 206, 202, 237, 211, 208, 80, 21, 37, 133, 172, 234, 142 ], "signatures": [ "8d62f9a2f7a5f0bf0ec47387c2a614cf75e1922c12af6399d15f4ce8723267034a43e43e2c396b0cb34ce11e05fe4541d59a6350d84afe8146da2de5dd919c0b0a3faf0a505f16c56c3f974766f85d8291a94eabf6ad37378801ccee1e3d9b0ee90f6712648328ef9a08de2c451904c038ee36a21fd80257de825039a9207008", "d86c59d728e1e4e82b6e3509bd2b5aa4dfee3e7252845e88bd34e36ecdf70400ddc9541620b102eead0c0e9307dabab7f064e6d2e9a9d14fc3d01f56acda3d05d5a2aaedd4e956c41bd0bc1c1f830b996ae0f2858ce3ec46dcf3b2cf6bb6c3036606cbf476b742c911dedb2aac2ff3ef18da6d86c2c88b7599c3de8fb4bda20e"] }


Less details