Tx hash: 2efffa2361349759c45d71acfcf3756c7c02f20126a61f8867736cb4b301d3fb

Tx prefix hash: 2b8c567c6e68bbeac6fe209b2f4edc18ea6c14e2aa21145ff17752f44cad841f
Tx public key: 5669ced406df2a5a53dc267a40237a80ea4e696ef551dc3b628d9a79d30fcdf0
Timestamp: 1525892441 Timestamp [UCT]: 2018-05-09 19:00:41 Age [y:d:h:m:s]: 07:360:03:40:08
Block: 277722 Fee: 0.000001 Tx size: 0.4365 kB
Tx version: 1 No of confirmations: 3710049 RingCT/type: no
Extra: 015669ced406df2a5a53dc267a40237a80ea4e696ef551dc3b628d9a79d30fcdf0

2 output(s) for total of 0.10 ETNX

stealth address amount amount idx
00: 8f71760191bb29125588ea0d58d40db8003248b73e064a650ab47e151f36a57e 0.00 681275 of 862456
01: 8b02a0870ceb89c9861d65846877e163c0dcc7b1395ce36416815c623b9bdbb1 0.10 307899 of 379867

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-02-28 15:26:19 till 2018-05-09 19:50:17; resolution: 0.412843 days)

  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 0.10 etn

key image 00: 5593c4017c70d4dd5993f141467e66a6cca55d4600b47f331f16947deb173710 amount: 0.10
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 520fd4308183e3a089b86f4a688d24ce4677ee5bceea50c0869bdf97b19f39c2 00277644 2 2/6 2018-05-09 17:30:12 07:360:05:10:37
- 01: c17d0325fa2b4c5a6d04d1917acc4c4a4f2b1a5b8feca6e2b3e23be670a9ee12 00277710 2 7/6 2018-05-09 18:49:11 07:360:03:51:38
key image 01: 439a80dcef1dabb86ac11810486c4ec2ff0b7609519d19a6e629fa3ac21f6aed amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9ef176ba411bb8b4f0a06a776d2cac1eb674ccb5b9af6dea595930837e52e55d 00176928 5 5/7 2018-02-28 16:26:19 08:065:06:14:30
- 01: 32b96a926d8e4673119e1e44f50178b39d492af9db6df3bf6eeedc25df48d1b3 00277711 2 2/5 2018-05-09 18:50:17 07:360:03:50:32
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 100000, "key_offsets": [ 306094, 1658 ], "k_image": "5593c4017c70d4dd5993f141467e66a6cca55d4600b47f331f16947deb173710" } }, { "key": { "amount": 9, "key_offsets": [ 669136, 316129 ], "k_image": "439a80dcef1dabb86ac11810486c4ec2ff0b7609519d19a6e629fa3ac21f6aed" } } ], "vout": [ { "amount": 8, "target": { "key": "8f71760191bb29125588ea0d58d40db8003248b73e064a650ab47e151f36a57e" } }, { "amount": 100000, "target": { "key": "8b02a0870ceb89c9861d65846877e163c0dcc7b1395ce36416815c623b9bdbb1" } } ], "extra": [ 1, 86, 105, 206, 212, 6, 223, 42, 90, 83, 220, 38, 122, 64, 35, 122, 128, 234, 78, 105, 110, 245, 81, 220, 59, 98, 141, 154, 121, 211, 15, 205, 240 ], "signatures": [ "468f3f459474873a6aad6ca45430c03b22d1f316da40c49daad77bca987ac90f8a401dcac7754218fd0be604f27c6fe30e9dd5b27eac278a8f485ac812038c0a1866d0a265c93b9777e3ac0fd57ba1235b30e9bbae48f7dd74e872f430f82f04be7664e2cb90aad612a50df57857039eba28a29838cb7303df1584c992a7f501", "c2d7a8edf82dc86443a83c3bdaef427c75ffbac96d1207359c0eaf4e12407a0fb27a6314c6572e8525beb50f0bfe34f45b04d70b9bf8c8daf70e1e124b207f04f2714d449c540a26fc4e4fbb9096c8b005577929f9fd699270b9b6837e353e00680b3ecd837bb99949b8817910db8e0eb681b226be735f24db147da8fcb6e403"] }


Less details