Tx hash: 24aab1aa31c47f077d7a68b1eba2e3c43d1d44a0f38a5667ab5cb3898c5a08a5

Tx prefix hash: 7d77483511fd84b4f4d4e82cda7801ec4d46d180c655fcd57a2370ac8f704f8f
Tx public key: facf9517e557e367a36b529c6091d0ce9b3813e043ac83de8bff020d0d2e90ba
Timestamp: 1526933740 Timestamp [UCT]: 2018-05-21 20:15:40 Age [y:d:h:m:s]: 07:357:08:51:52
Block: 295356 Fee: 0.000001 Tx size: 0.4053 kB
Tx version: 1 No of confirmations: 3705330 RingCT/type: no
Extra: 01facf9517e557e367a36b529c6091d0ce9b3813e043ac83de8bff020d0d2e90ba

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 55ffa21a2db4b517419b1cf99823eda164d5a672362361d10580b7ce62085c13 0.00 673058 of 722888
01: a2334865e05ea1c33744633b9b613d46e6d7752d6d69b81b0fca21f3c179c038 0.00 6700044 of 7257418

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-05-21 18:57:02 till 2018-05-21 20:57:02; resolution: 0.000490 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|

3 inputs(s) for total of 0.00 etn

key image 00: e00ed496af47d744b723f8fe5a9ee498ceb57f2307332dae61d639979f8c0b5e amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9dbeb15f3edbe670ec27643c7dceb2f03ed85f6baf9eb498ba191401621a49b4 00295331 1 8/179 2018-05-21 19:57:02 07:357:09:10:30
key image 01: f3467a2c7340b58f8207ca147165404e03c03d0b83b4f9a4c5da84ba4e642098 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e4df6d2780c3a6589167cffdb26e1cbeaeb8546976232c20742d7fc346093477 00295331 1 8/179 2018-05-21 19:57:02 07:357:09:10:30
key image 02: 883ca14a222634250d701410cd3842e0dbf1ac23ce622caf21be8510e15ba028 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4b881a8bdb37322af5a358faf7c62a901f82173ea86614ed16eae9b97cca83a6 00295331 1 8/179 2018-05-21 19:57:02 07:357:09:10:30
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 60, "key_offsets": [ 672802 ], "k_image": "e00ed496af47d744b723f8fe5a9ee498ceb57f2307332dae61d639979f8c0b5e" } }, { "key": { "amount": 1, "key_offsets": [ 376889 ], "k_image": "f3467a2c7340b58f8207ca147165404e03c03d0b83b4f9a4c5da84ba4e642098" } }, { "key": { "amount": 1000, "key_offsets": [ 6698317 ], "k_image": "883ca14a222634250d701410cd3842e0dbf1ac23ce622caf21be8510e15ba028" } } ], "vout": [ { "amount": 60, "target": { "key": "55ffa21a2db4b517419b1cf99823eda164d5a672362361d10580b7ce62085c13" } }, { "amount": 1000, "target": { "key": "a2334865e05ea1c33744633b9b613d46e6d7752d6d69b81b0fca21f3c179c038" } } ], "extra": [ 1, 250, 207, 149, 23, 229, 87, 227, 103, 163, 107, 82, 156, 96, 145, 208, 206, 155, 56, 19, 224, 67, 172, 131, 222, 139, 255, 2, 13, 13, 46, 144, 186 ], "signatures": [ "cc958be8e64d950f86e8d37008a06b6a02b16ec2053f128385ccce45aa3c950b64d412d33462f6d207f85783bacf0846d3292a4303324d489d8420eb5d495c08", "ae5c67228db3133754cedc1793f71a151781508fbd6df96690ae3eea5f9fa308582a49dd6f1ada67e1674c8db065a46f7d1e917d0a29e7c11cdd0313b6ab8d0d", "ab76bca9218c3a1444effec65173703161a9baf0e53bad2d901d3ab2b34eea0cf84b2274b7564fde89383e421862e126a925dc8ef606f416d35310503a74c80d"] }


Less details