Tx hash: 26f114776c9c31c69906d3196335a14c9253a5b7d52752ba0674756a757aadc3

Tx prefix hash: 721fb500df373e097c2f16803e13a976593692f795b08400f41df56d06b80968
Tx public key: 5dd4e66374b4ec9ce78b70fb16fb710e6c717699ba7f4fd0bf1bea462778f05a
Timestamp: 1513546117 Timestamp [UCT]: 2017-12-17 21:28:37 Age [y:d:h:m:s]: 08:141:01:32:08
Block: 71844 Fee: 0.000001 Tx size: 0.4053 kB
Tx version: 1 No of confirmations: 3920142 RingCT/type: no
Extra: 015dd4e66374b4ec9ce78b70fb16fb710e6c717699ba7f4fd0bf1bea462778f05a

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 819c87b0fdf7c257dd721d9e26dc8b1626b0fcf394fc2820137f111866c75c44 0.00 326564 of 968489
01: 7c194abe89dbf270e69a23808b9b5d7dc182647a25a4927c8b6be3127afa4b47 0.00 167534 of 862456

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-17 20:11:45 till 2017-12-17 22:12:36; resolution: 0.000494 days)

  • |____________________________________________________________________________________*_____________________________________________________________________________________|
  • |______________________________________________________________________________________*___________________________________________________________________________________|
  • |____________________________________________________________________________________*_____________________________________________________________________________________|

3 inputs(s) for total of 0.00 etn

key image 00: a78465118299d472c45225d97902b10c75fb1b352aa788a5d6f0dfaec7596866 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f71af56929f04a8f77fdfc348a1664fad97c78b4ec83d5ee480866c1f503354c 00071832 1 2/3 2017-12-17 21:11:45 08:141:01:49:00
key image 01: 853f435124aabc5d97a9b52a7dbc6e8706be1173e0e2dc2f4568ba9960993f09 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c3b439a0957887277b3da627bfd065a2ff4f2a1c0e7ff81854ba2bf63702f7cc 00071833 1 1/6 2017-12-17 21:12:36 08:141:01:48:09
key image 02: 82e5801682c21f71c8afd2b4d1b9339dc4a08de6ff13092255eb631ace4c9227 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 01c32f089bfe6e739fbdbfd2b415a8cbae1d0aa813df78176ac96d967b9d7039 00071832 1 1/4 2017-12-17 21:11:45 08:141:01:49:00
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 300, "key_offsets": [ 571053 ], "k_image": "a78465118299d472c45225d97902b10c75fb1b352aa788a5d6f0dfaec7596866" } }, { "key": { "amount": 500, "key_offsets": [ 479714 ], "k_image": "853f435124aabc5d97a9b52a7dbc6e8706be1173e0e2dc2f4568ba9960993f09" } }, { "key": { "amount": 9, "key_offsets": [ 269974 ], "k_image": "82e5801682c21f71c8afd2b4d1b9339dc4a08de6ff13092255eb631ace4c9227" } } ], "vout": [ { "amount": 800, "target": { "key": "819c87b0fdf7c257dd721d9e26dc8b1626b0fcf394fc2820137f111866c75c44" } }, { "amount": 8, "target": { "key": "7c194abe89dbf270e69a23808b9b5d7dc182647a25a4927c8b6be3127afa4b47" } } ], "extra": [ 1, 93, 212, 230, 99, 116, 180, 236, 156, 231, 139, 112, 251, 22, 251, 113, 14, 108, 113, 118, 153, 186, 127, 79, 208, 191, 27, 234, 70, 39, 120, 240, 90 ], "signatures": [ "5aa9b6aca4701bf22daefacbe513cdadd712ca9d1707042fec5363be0f418b0536a71017c8c7558e2c175c47bad757e9c7bd4cca6bfbe03e7e49bff3711e5904", "25da96c8afe0773e91c1e8f1304b061fc7affd770f5dd52d1fa66e22e8ab1e019d7d657c9e007528b371de0932d7faddf1d166668e73c150ab387c2d21821501", "959553f9cff8975e382f33f5b94e78218d2c8514f3a7bce647021fcaf5b57a07124559633f62167cff1c272721a122010a097fbad0616cabecade7997eec6c06"] }


Less details