Tx hash: 26c9a3ee0f4507c4faff084a4dbf793fe0805f5e4f9227f404cf28d3658f461f

Tx prefix hash: 7e4aa0250129450a3ce82c091dfd84ca3d3f71d410df4a04511afc39b15cad87
Tx public key: 1bb81ec7db05a704f8e049813c8d566a6618bdeb6482fc47fb8cbaa835f41bb8
Timestamp: 1512894564 Timestamp [UCT]: 2017-12-10 08:29:24 Age [y:d:h:m:s]: 08:144:01:49:09
Block: 61310 Fee: 0.000001 Tx size: 0.3047 kB
Tx version: 1 No of confirmations: 3924350 RingCT/type: no
Extra: 011bb81ec7db05a704f8e049813c8d566a6618bdeb6482fc47fb8cbaa835f41bb8

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: fbb70cb55fce4ab2a42dd9e577b4b237cdc5b6a956a54f8fc0f0681c7427d968 0.00 158581 of 1204163
01: f8601113b59b7caba49acacbc2cc796d792ec64c4457e533e73375290fa8a721 0.00 1252145 of 7257418

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-10 07:06:56 till 2017-12-10 09:08:07; resolution: 0.000495 days)

  • |____________________________________________________________________________________*_____________________________________________________________________________________|
  • |______________________________________________________________________________________*___________________________________________________________________________________|

2 inputs(s) for total of 0.00 etn

key image 00: 6ec0d37ab607a60712a5f52d5eea4e1feeb61d3958da93f51a8d308c1fc50e02 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d06c02e998edcd0513852f7b64dd07451db5723f0271ec811d7d8ca04a428fe5 00061289 1 5/3 2017-12-10 08:06:56 08:144:02:11:37
key image 01: c4aec6edf21427b0a6d0255bed758b59abcc24b9d716ef4017e2678d8b684a2e amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 25a9f27d8a29d3a7c6fd915dcfb5e8d66427daf4f72d730afbbcb0114cb668d8 00061291 1 4/4 2017-12-10 08:08:07 08:144:02:10:26
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 10, "key_offsets": [ 148473 ], "k_image": "6ec0d37ab607a60712a5f52d5eea4e1feeb61d3958da93f51a8d308c1fc50e02" } }, { "key": { "amount": 1000, "key_offsets": [ 1251293 ], "k_image": "c4aec6edf21427b0a6d0255bed758b59abcc24b9d716ef4017e2678d8b684a2e" } } ], "vout": [ { "amount": 9, "target": { "key": "fbb70cb55fce4ab2a42dd9e577b4b237cdc5b6a956a54f8fc0f0681c7427d968" } }, { "amount": 1000, "target": { "key": "f8601113b59b7caba49acacbc2cc796d792ec64c4457e533e73375290fa8a721" } } ], "extra": [ 1, 27, 184, 30, 199, 219, 5, 167, 4, 248, 224, 73, 129, 60, 141, 86, 106, 102, 24, 189, 235, 100, 130, 252, 71, 251, 140, 186, 168, 53, 244, 27, 184 ], "signatures": [ "0606dfd9ef00d40ac86599b83945e45cc4c8e7323f7505dfebe69a84261184018527b3ae2113289f24f2af222189328955d2c7abc02b96495d3e04c03c0ddb0b", "7ec4546841edd9c8c1c160026ab35ef6e4aa4062efab6799945925e60004680dfaf807412a9f9c5cd3d6ba1f20e8051b0528deca5f2f438035e926bd6ba64f00"] }


Less details