Tx hash: 25e6a96addd2f84962c6d22e0e4394d0dea8c02c8bb822cf7ef922cab369588e

Tx prefix hash: d61dfb510e05634545569a4fe6eba5b472bccff49440dd868da25cbe5f276bf9
Tx public key: e07069169dc2105324990bfca04fdcf4b68eab658f6a62a7af77c1e8f794865a
Timestamp: 1513021780 Timestamp [UCT]: 2017-12-11 19:49:40 Age [y:d:h:m:s]: 08:145:07:56:53
Block: 63346 Fee: 0.000001 Tx size: 0.3721 kB
Tx version: 1 No of confirmations: 3926110 RingCT/type: no
Extra: 01e07069169dc2105324990bfca04fdcf4b68eab658f6a62a7af77c1e8f794865a

4 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 8d7128c0185bd979c526fb116290b004e210f81507ce683cf10b3f41c355a55e 0.00 554391 of 2212696
01: 094f0b92aedd6847373b15366e67aec09fadf8fba7bc4b5736299e791788c899 0.00 1334020 of 7257418
02: 6544a5e0d472668f9257fe16dc4b4e435e2109c26c6f38544ed4d18b74a0dc47 0.00 267454 of 1252607
03: eea90d1584e700fc38f7fb518cf9f49047c289b7c6ac30b3444ae88a72f5915f 0.00 117770 of 862456

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-11 18:13:10 till 2017-12-11 20:23:12; resolution: 0.000531 days)

  • |______________________________________________________________________________*___________________________________________________________________________________________|
  • |____________________________________________________________________________________________*_____________________________________________________________________________|

2 inputs(s) for total of 0.00 etn

key image 00: a38f1c56c054ec740460d4bde57382da73947ef8c0d7a3b345d9773aa9b1d5bd amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4fd2c367b64084eca3db7e3f93632bfc45499187caad691d83f2a46db834d535 00063302 1 1/4 2017-12-11 19:13:10 08:145:08:33:23
key image 01: c943ca4be8d599a6061515d8a18a5e32f536ec24ad4141161e8599c145c3bdc7 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c31db08e904e98fef26778909457b6bade750615412f7641c5b172a7d9591922 00063312 1 2/5 2017-12-11 19:23:12 08:145:08:23:21
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 9, "key_offsets": [ 181361 ], "k_image": "a38f1c56c054ec740460d4bde57382da73947ef8c0d7a3b345d9773aa9b1d5bd" } }, { "key": { "amount": 2000, "key_offsets": [ 477648 ], "k_image": "c943ca4be8d599a6061515d8a18a5e32f536ec24ad4141161e8599c145c3bdc7" } } ], "vout": [ { "amount": 100, "target": { "key": "8d7128c0185bd979c526fb116290b004e210f81507ce683cf10b3f41c355a55e" } }, { "amount": 1000, "target": { "key": "094f0b92aedd6847373b15366e67aec09fadf8fba7bc4b5736299e791788c899" } }, { "amount": 900, "target": { "key": "6544a5e0d472668f9257fe16dc4b4e435e2109c26c6f38544ed4d18b74a0dc47" } }, { "amount": 8, "target": { "key": "eea90d1584e700fc38f7fb518cf9f49047c289b7c6ac30b3444ae88a72f5915f" } } ], "extra": [ 1, 224, 112, 105, 22, 157, 194, 16, 83, 36, 153, 11, 252, 160, 79, 220, 244, 182, 142, 171, 101, 143, 106, 98, 167, 175, 119, 193, 232, 247, 148, 134, 90 ], "signatures": [ "418652d1d44f118611f94fcc0ac9b6a8caf7d837c983e1e1f07b0655478461019fe98a30446f2c6fbbe25628f5ec502a85ef02b86703eec6d011405481195a0d", "76cb7ed302869fd03e49cd058544890a959507c84bdfa84971c14a6b8e25b508c9d959b104e35ad07ea5974c393f06567dddb336bddfa4970d1ffe8a96158909"] }


Less details