Tx hash: 2e130516d593131dba881129916b9af350aa52b34b386bfa0ce365c16045c49d

Tx prefix hash: d7e563ac9734b54dc622474207273a471bca6b670a4aff679b25771ccf483604
Tx public key: c3823a5a49b6e66be0be54385548276b8284fabfd6e032108d4964defc94ac0d
Timestamp: 1512720922 Timestamp [UCT]: 2017-12-08 08:15:22 Age [y:d:h:m:s]: 08:156:14:17:52
Block: 58217 Fee: 0.000001 Tx size: 0.3711 kB
Tx version: 1 No of confirmations: 3942090 RingCT/type: no
Extra: 01c3823a5a49b6e66be0be54385548276b8284fabfd6e032108d4964defc94ac0d

4 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 768dbfb1402ccd9574a4151bf07015d2d09426e95c34d0b7e2304deaab3c0c20 0.00 153917 of 1027483
01: 94b7e2fe2f2543586f18839d25d950c13f6c985cd77c8884989c8d58d228dde4 0.00 478270 of 2212696
02: d7ecf57cc5cc0a68e6ce21c9e73c93709df974e0b42cc6a5364d1ce68389d5e2 0.00 239157 of 1012165
03: 5d56e042e838dd9c830a5c791e3c84c76c48268b9182665a5f8b86e925d4e498 0.00 116966 of 1204163

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-08 06:56:40 till 2017-12-08 08:59:05; resolution: 0.000500 days)

  • |_______________________________________________________________________________________*__________________________________________________________________________________|
  • |___________________________________________________________________________________*______________________________________________________________________________________|

2 inputs(s) for total of 0.00 etn

key image 00: 0da322e8abba8f341c72e52439f32ec26fff604f524b567f66c9168951b90c43 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9f287c5e80d7516ef88b03d2c6c7fb2498544520151fa40a5f0f5cead7d316c7 00058198 1 1/5 2017-12-08 07:59:05 08:156:14:34:09
key image 01: b94d41dc333e14278bbfb989d15ce525586724a0433cfca1b50e8e17bc82e5d0 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6f8199e953e6ef85cd9b9c0d87f56cd4b042fd4f8ecbc43eb03a8d1614037f91 00058195 1 3/5 2017-12-08 07:56:40 08:156:14:36:34
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 90, "key_offsets": [ 209892 ], "k_image": "0da322e8abba8f341c72e52439f32ec26fff604f524b567f66c9168951b90c43" } }, { "key": { "amount": 800, "key_offsets": [ 216211 ], "k_image": "b94d41dc333e14278bbfb989d15ce525586724a0433cfca1b50e8e17bc82e5d0" } } ], "vout": [ { "amount": 80, "target": { "key": "768dbfb1402ccd9574a4151bf07015d2d09426e95c34d0b7e2304deaab3c0c20" } }, { "amount": 100, "target": { "key": "94b7e2fe2f2543586f18839d25d950c13f6c985cd77c8884989c8d58d228dde4" } }, { "amount": 700, "target": { "key": "d7ecf57cc5cc0a68e6ce21c9e73c93709df974e0b42cc6a5364d1ce68389d5e2" } }, { "amount": 9, "target": { "key": "5d56e042e838dd9c830a5c791e3c84c76c48268b9182665a5f8b86e925d4e498" } } ], "extra": [ 1, 195, 130, 58, 90, 73, 182, 230, 107, 224, 190, 84, 56, 85, 72, 39, 107, 130, 132, 250, 191, 214, 224, 50, 16, 141, 73, 100, 222, 252, 148, 172, 13 ], "signatures": [ "8a3dd3e66608650b6e318e5a3f05a11a68727770a396474bef95f96534d96e0120065a3bef261b732f36e906797bd07a82d54758052a4ade6edc4878b206ee0c", "5fc6e1c25b082db8505e835f7db6e4dce9d610759efc16934dd935520d3d7209c84e90b630834c80d054a0fb77f29a117ecb73ea0fa5e60cc45dda944fc5950f"] }


Less details