Tx hash: 23cd6a5381f7055bbe0d6acdd02ba6b97b14833ca39b9299144f3ecf148932f5

Tx prefix hash: b1a467c9c4cfb61e28f558e0637c7cd821b67336b97c8e4b40d90fd7b4563a19
Tx public key: 34b14ca520cbcac294b96a6cdfe6d45146a5135b533c8f5701e91a284581f4d1
Timestamp: 1512651921 Timestamp [UCT]: 2017-12-07 13:05:21 Age [y:d:h:m:s]: 08:158:02:20:29
Block: 56825 Fee: 0.000002 Tx size: 0.4043 kB
Tx version: 1 No of confirmations: 3944456 RingCT/type: no
Extra: 0134b14ca520cbcac294b96a6cdfe6d45146a5135b533c8f5701e91a284581f4d1

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 863e57ad49e77fc092b200ed33c7c98699696029d5fdef8e2b460140c5ce9c28 0.00 191278 of 1393312
01: 2e3e3ca5f8486ab04d98fe686bec1bd61c113b127b7a021f4727511199d6ac9a 0.00 258921 of 1089390

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-07 11:48:02 till 2017-12-07 13:49:38; resolution: 0.000497 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |____________________________________________________________________________________*_____________________________________________________________________________________|
  • |______________________________________________________________________________________*___________________________________________________________________________________|

3 inputs(s) for total of 0.00 etn

key image 00: 6d5385e17415ab960aa806c2dc4844b56fe792e9946fb0c4b3eeee5e606351fe amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7935695c6984033ac0833a083c58367593b8b9088ebc1c1f2ec5c25a6dd066eb 00056810 1 2/3 2017-12-07 12:49:03 08:158:02:36:47
key image 01: d069a6630c953f11b2ee44a35f7c688c0e2bc8cb25c460a414330dd88e721e36 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 86dae0bc5060cadc824ebdc069a8cadade5bbf4dfd0d273840a0f3914290a59a 00056807 1 1/6 2017-12-07 12:48:02 08:158:02:37:48
key image 02: edb5a69e573abf19c26c602eeb2064d094a37267cbb1d818f244590954fbbb1c amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d2c8d540b7ffec510d379172c54f36dc8671343e0e225cb9a36e1a6ff6dac9d2 00056809 1 15/6 2017-12-07 12:49:38 08:158:02:36:12
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 2, "key_offsets": [ 26602 ], "k_image": "6d5385e17415ab960aa806c2dc4844b56fe792e9946fb0c4b3eeee5e606351fe" } }, { "key": { "amount": 90, "key_offsets": [ 191014 ], "k_image": "d069a6630c953f11b2ee44a35f7c688c0e2bc8cb25c460a414330dd88e721e36" } }, { "key": { "amount": 600, "key_offsets": [ 258692 ], "k_image": "edb5a69e573abf19c26c602eeb2064d094a37267cbb1d818f244590954fbbb1c" } } ], "vout": [ { "amount": 90, "target": { "key": "863e57ad49e77fc092b200ed33c7c98699696029d5fdef8e2b460140c5ce9c28" } }, { "amount": 600, "target": { "key": "2e3e3ca5f8486ab04d98fe686bec1bd61c113b127b7a021f4727511199d6ac9a" } } ], "extra": [ 1, 52, 177, 76, 165, 32, 203, 202, 194, 148, 185, 106, 108, 223, 230, 212, 81, 70, 165, 19, 91, 83, 60, 143, 87, 1, 233, 26, 40, 69, 129, 244, 209 ], "signatures": [ "36ed9924cf907fce1eaa8c4a7df0fefe6319047fea856137e0449a3387fe460cbf7ee0cd3a49df7edcaca4235c9ab50b15d0813c57aecd5fa4743eee9172170c", "9e6adf6f3c048a3d197c6af32484d5cc21930f7aad7f48df1186415f9c15ba0d57be3e490425d734e91aad368a2cb3bc34ed0144f584f3c7fb5091e64e220704", "9f0f5d352e206cbebf17749bd9c7d3f303cb243584d08df5607d545bc8f31f071a16355a3e0657747fb719601b175e6b30990277b6ee5eba8048e7259f940301"] }


Less details