Tx hash: 2dbd6981959171d369d57e976e4dd59da5eca4d8519ecd06f0533f5266382826

Tx prefix hash: 452c8f633e68a584a68c0ef65c9f00c6d4ca4e94e7aa381fe5d90170d3473d5c
Tx public key: e09134b42b9caca505514750ef1b7ebf9cccbc4d507d59603a9f6e36c71bbdcd
Timestamp: 1527473252 Timestamp [UCT]: 2018-05-28 02:07:32 Age [y:d:h:m:s]: 07:349:02:30:27
Block: 304374 Fee: 0.000001 Tx size: 0.4062 kB
Tx version: 1 No of confirmations: 3693506 RingCT/type: no
Extra: 01e09134b42b9caca505514750ef1b7ebf9cccbc4d507d59603a9f6e36c71bbdcd

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 00a293e16165b079a15c388f6ae8384367724ee063bbee62bb215d57787af08a 0.00 2188130 of 2212696
01: 8eaa22f4cba255b5fde54be33c0c6e58c1918d8549554afc2e70a9c29082a8c3 0.00 7134275 of 7257418

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-05-26 02:31:53 till 2018-05-27 06:44:17; resolution: 0.006913 days)

  • |______*___________________________________________________________________________________________________________________________________________________________________|
  • |____________________________________________________________________________________________________________________________________________________________________*_____|
  • |____________________________________________________________________________________________________________________________________________________________________*_____|

3 inputs(s) for total of 0.00 etn

key image 00: 379d39e804b98ec70ce1a4181d45d191032db38a65bd432bf97364cba68ee049 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1c96a3283849ce59243ef6a75d79f8b90ec29ad632c52b458c4ddc98a0b33736 00301547 1 3/3 2018-05-26 03:31:53 07:351:01:06:06
key image 01: 6edbe568c5c987bf65aaaa6585227c785726e76f6d7c67ef69a7c10db99d6a62 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 36ccf61fb217370a0575c1eec0ed2ed2a95416eb58d1695dfba9a58819645822 00303146 1 3/109 2018-05-27 05:44:17 07:349:22:53:42
key image 02: 6d8afadf33c683d1f67f037e8a2d3f34b39a26d84796f27f1e2f32a65b1690b8 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: dbe1420f85517c96422c721f97284bf2205bba3232ccc4d679db353f7711bb52 00303146 1 3/109 2018-05-27 05:44:17 07:349:22:53:42
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 100, "key_offsets": [ 2174519 ], "k_image": "379d39e804b98ec70ce1a4181d45d191032db38a65bd432bf97364cba68ee049" } }, { "key": { "amount": 1, "key_offsets": [ 420444 ], "k_image": "6edbe568c5c987bf65aaaa6585227c785726e76f6d7c67ef69a7c10db99d6a62" } }, { "key": { "amount": 1000, "key_offsets": [ 7102746 ], "k_image": "6d8afadf33c683d1f67f037e8a2d3f34b39a26d84796f27f1e2f32a65b1690b8" } } ], "vout": [ { "amount": 100, "target": { "key": "00a293e16165b079a15c388f6ae8384367724ee063bbee62bb215d57787af08a" } }, { "amount": 1000, "target": { "key": "8eaa22f4cba255b5fde54be33c0c6e58c1918d8549554afc2e70a9c29082a8c3" } } ], "extra": [ 1, 224, 145, 52, 180, 43, 156, 172, 165, 5, 81, 71, 80, 239, 27, 126, 191, 156, 204, 188, 77, 80, 125, 89, 96, 58, 159, 110, 54, 199, 27, 189, 205 ], "signatures": [ "a749ddcff500bf534ee34b4cc76562d5ab8fd1082c78f54f8b89e96d373b3804e9577716f98f8ac63add7d8614f288208c19301b34b2e1ef9dcc9e44512a3f0e", "65fa2598d868e80d47f02593f5af2aa2cb6f3357e8eb59a8d8aaa2e9cf13670c87694bba9880bd9dc49a582ece367d748ce10e8c351f90558a38f74ccf216b02", "00d6b45267ae39ebca756148b939545fab0cd54637cdc5ebab377c8f5596f80de42f5c428f4346a60a0d3fa08474363e46e6763ace5e3cc9dcbfc27909a83c01"] }


Less details