Tx hash: 2d8998bf0dabd12a1b7bda2deb75c5feb0abeb5070958b42fbfe0407b5b45f0c

Tx prefix hash: 1e8dcfea1aa0164c90a1856de0665dc290528197574a7b9250a470a02f2b4e1b
Tx public key: 951c444ac65d4b56d6c871fd748f2fb6e91f6729ff8b7b3f5f3a6a97ae96fa6b
Timestamp: 1523425490 Timestamp [UCT]: 2018-04-11 05:44:50 Age [y:d:h:m:s]: 08:022:10:43:02
Block: 236291 Fee: 0.000001 Tx size: 0.4336 kB
Tx version: 1 No of confirmations: 3749728 RingCT/type: no
Extra: 01951c444ac65d4b56d6c871fd748f2fb6e91f6729ff8b7b3f5f3a6a97ae96fa6b

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 66fda6751a2088e050c489f49d2e5e14edb67ce29f7aedd6da5d11502d294db6 0.00 925977 of 1488031
01: f0b7399d538ed8ef140ff6d9ce7234b0ff53c9bbba668ab907f8b88bcadca1d4 0.00 641201 of 918752

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-04-03 14:19:20 till 2018-04-11 04:01:36; resolution: 0.044535 days)

  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |______________________________________________________________________________________*________________________________________________________________*__________________|

2 inputs(s) for total of 0.00 etn

key image 00: 7e78fa2ea4ccd8570dffedd491ae1e80ebc30a6e8d08b8b108ac39ac35671e36 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 82b0b24557366fb3f7b0a8cf4f00ad73cc89db68bc426e2f3fbf47607b7ab409 00225335 0 0/6 2018-04-03 15:19:20 08:030:01:08:32
- 01: b20eacbda7d71dc7c95d9fabebb843dd45f84054a6cd8b5f4278ca7f03b097b6 00236158 5 2/3 2018-04-11 03:01:36 08:022:13:26:16
key image 01: 12a8f66fae0a3626e5175e736b86e7cb100da1a8985b45ce9c10e9a7c6832fa6 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 50f2944c62956484b02f07630dbcca52402574395ce69026795d9d9718c3753e 00230923 8 1/3 2018-04-07 10:07:07 08:026:06:20:45
- 01: 0bd3d34ff825f78a085abe385b7b3e2d85d06987fc79a7b73e5cb945309a5f01 00234971 5 1/3 2018-04-10 08:03:15 08:023:08:24:37
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 9, "key_offsets": [ 825187, 38418 ], "k_image": "7e78fa2ea4ccd8570dffedd491ae1e80ebc30a6e8d08b8b108ac39ac35671e36" } }, { "key": { "amount": 9, "key_offsets": [ 841482, 18224 ], "k_image": "12a8f66fae0a3626e5175e736b86e7cb100da1a8985b45ce9c10e9a7c6832fa6" } } ], "vout": [ { "amount": 10, "target": { "key": "66fda6751a2088e050c489f49d2e5e14edb67ce29f7aedd6da5d11502d294db6" } }, { "amount": 7, "target": { "key": "f0b7399d538ed8ef140ff6d9ce7234b0ff53c9bbba668ab907f8b88bcadca1d4" } } ], "extra": [ 1, 149, 28, 68, 74, 198, 93, 75, 86, 214, 200, 113, 253, 116, 143, 47, 182, 233, 31, 103, 41, 255, 139, 123, 63, 95, 58, 106, 151, 174, 150, 250, 107 ], "signatures": [ "4aee0280863c8fd591a9ee5bd6aa0d7cabb14f14fa06d96e49f836c47b9fca022dcf622661586b523cb1374d8441703540b4a6b7e7b84b04b202f3d2b36c210816077bba5a98c0fbad02dbbae82459f0327ecda871e83c974ba6afe793a7e203dc8122b8bd073c239f5d15478d40c31f4b4e7c3aa1ddcc975653732cdbd1f605", "9b9455532300ab441daf789548a874a7eb2aef511e07646caf84c7203efb96034fd5c840bcaffacff5441cb1d973ea7c9576d13b8915bb38cd0d2d413659a508e2e60f0158d46c59d08722e7c6bd91e35db6a9062efb2cdebea6a626d90bc40e3716c22d491980045a5579d90f78a3550263324e63fa925ddcf06d66d26c910c"] }


Less details