Tx hash: 2f35f5056920e0feaead773630bed6dcf64305f6166eb31bc12f5c02fd332c25

Tx prefix hash: 249c54f9949cad9db07dd545e08b3aa08e281b7398ae31926985f9bb24781a9e
Tx public key: e157370f66acc07a4c931c58fbad3a80ad16eb9c36324b40a3bf466608eff389
Timestamp: 1512683665 Timestamp [UCT]: 2017-12-07 21:54:25 Age [y:d:h:m:s]: 08:151:04:16:49
Block: 57502 Fee: 0.000001 Tx size: 0.3730 kB
Tx version: 1 No of confirmations: 3934664 RingCT/type: no
Extra: 01e157370f66acc07a4c931c58fbad3a80ad16eb9c36324b40a3bf466608eff389

4 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 07309da5440c4aeacd04bc10cf2cf217f7afb6beae6f65bc82205dfcfdedd7c1 0.00 213378 of 1252607
01: a251a9d2b85a59213874b623f84d5346295e52b62732df2b64e96d2a095804cd 0.00 266616 of 1089390
02: a3175af9ac84b21795cc5bd70f3c1c1e55e9aced7aad156e125dd1310679e48b 0.00 107502 of 1204163
03: f26bb2801c5a05e17d0a68923a9654b4e01f9b512b35413bbbf3484c56e46f71 0.00 201139 of 1393312

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-07 20:27:08 till 2017-12-07 22:37:35; resolution: 0.000533 days)

  • |____________________________________________________________________________________________*_____________________________________________________________________________|
  • |______________________________________________________________________________*___________________________________________________________________________________________|

2 inputs(s) for total of 0.00 etn

key image 00: 93f935fa5ba5125a8e44069c2b5c8669de97dd2f39149417ee5b57ca632424b1 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: dc06b59b38c458ebef682fe6394bda0729ddf2099c68e06c213afae3ff57d715 00057486 1 3/3 2017-12-07 21:37:35 08:151:04:33:39
key image 01: 5e67386f45b9b8f722170faecc0f2cdd6fb10017a53e263ddc2141cf77b0ba7e amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 70a8ee45c51ccc337d553bd8e787633cab9cb73af529ef2680f54b6ca1039c17 00057477 1 5/4 2017-12-07 21:27:08 08:151:04:44:06
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 800, "key_offsets": [ 209946 ], "k_image": "93f935fa5ba5125a8e44069c2b5c8669de97dd2f39149417ee5b57ca632424b1" } }, { "key": { "amount": 800, "key_offsets": [ 209813 ], "k_image": "5e67386f45b9b8f722170faecc0f2cdd6fb10017a53e263ddc2141cf77b0ba7e" } } ], "vout": [ { "amount": 900, "target": { "key": "07309da5440c4aeacd04bc10cf2cf217f7afb6beae6f65bc82205dfcfdedd7c1" } }, { "amount": 600, "target": { "key": "a251a9d2b85a59213874b623f84d5346295e52b62732df2b64e96d2a095804cd" } }, { "amount": 9, "target": { "key": "a3175af9ac84b21795cc5bd70f3c1c1e55e9aced7aad156e125dd1310679e48b" } }, { "amount": 90, "target": { "key": "f26bb2801c5a05e17d0a68923a9654b4e01f9b512b35413bbbf3484c56e46f71" } } ], "extra": [ 1, 225, 87, 55, 15, 102, 172, 192, 122, 76, 147, 28, 88, 251, 173, 58, 128, 173, 22, 235, 156, 54, 50, 75, 64, 163, 191, 70, 102, 8, 239, 243, 137 ], "signatures": [ "3867d6457ec3621f2b11a30333fd1a30a89359e180a5b8f0cfdc7f89cad144060dbb669fc3342822987e05e7684e67c9f4efe35028a735638552b66ab01e6309", "cb61ccf11f534e915403c1bb10d8fa356c3b30c5f2f10486890ba63c63ad810eb807a70d3eff49b28a30d9c79eb60103abc87448d3f96f75f4b8b5dd30f0b102"] }


Less details