Tx hash: 2f4c61cf173635311e95606aa3a17fc9a9e179f9ed6f3f8ef6e0db3a33c8c736

Tx prefix hash: 9c42b3c2cf6970300879ee03ab530a753074419f14b71b93603ef6b88a0bb3f9
Tx public key: 3c7fab9c3b0ecd9049125e5eeff55e19276d5adeff28f49d1cd950fc19d92f10
Timestamp: 1526596450 Timestamp [UCT]: 2018-05-17 22:34:10 Age [y:d:h:m:s]: 07:351:09:52:43
Block: 289748 Fee: 0.000001 Tx size: 0.4365 kB
Tx version: 1 No of confirmations: 3697200 RingCT/type: no
Extra: 013c7fab9c3b0ecd9049125e5eeff55e19276d5adeff28f49d1cd950fc19d92f10

2 output(s) for total of 0.10 ETNX

stealth address amount amount idx
00: bf12a6ce9b5158c18b81acbb989be67d66568150d30b4dbb3453015de4efd9a1 0.10 358001 of 379867
01: a880e957c36331e14af101ff67af3cde49a6c8e854850a9b64c90aa703843e1f 0.00 615344 of 714591

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-04-05 07:25:11 till 2018-05-17 22:50:45; resolution: 0.250840 days)

  • |________________________________________________________________________________________________________________________________________________________________________**|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 0.10 etn

key image 00: 3678de04c9d01d704a13157431f9ee9beca2374ee2ecdeb04e5274123c04d4fb amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8f880a504ab1650b52d75a7da94acc25fdfadb20acc55f9301275227b7d2b419 00289159 2 3/4 2018-05-17 13:25:30 07:351:19:01:23
- 01: 84eb54ae3afe503c64f53a7f834896f857d822d8a75e51a5e70fe0d34cb71709 00289664 2 11/7 2018-05-17 20:52:57 07:351:11:33:56
key image 01: 755af08c40f1dc80518927dfd57acc64b3f1e44682e2de6d66d20879806337b9 amount: 0.10
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 69d56694e4117abe047a92984d870e09920ad4706c9ce4d4e857fd19af63e13e 00227824 2 23/48 2018-04-05 08:25:11 08:029:00:01:42
- 01: bcbba2cf9c136880a532cd2a58886b3ac9066180a094305ef9d9737cba3b174a 00289728 2 11/7 2018-05-17 21:50:45 07:351:10:36:08
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 7, "key_offsets": [ 804181, 4826 ], "k_image": "3678de04c9d01d704a13157431f9ee9beca2374ee2ecdeb04e5274123c04d4fb" } }, { "key": { "amount": 100000, "key_offsets": [ 266106, 91062 ], "k_image": "755af08c40f1dc80518927dfd57acc64b3f1e44682e2de6d66d20879806337b9" } } ], "vout": [ { "amount": 100000, "target": { "key": "bf12a6ce9b5158c18b81acbb989be67d66568150d30b4dbb3453015de4efd9a1" } }, { "amount": 6, "target": { "key": "a880e957c36331e14af101ff67af3cde49a6c8e854850a9b64c90aa703843e1f" } } ], "extra": [ 1, 60, 127, 171, 156, 59, 14, 205, 144, 73, 18, 94, 94, 239, 245, 94, 25, 39, 109, 90, 222, 255, 40, 244, 157, 28, 217, 80, 252, 25, 217, 47, 16 ], "signatures": [ "6be22df065d13e0f2ab0ba6a049413365e1314cc8ac9625815521c1113641906f532f524b2460d1cdf482317af2c1d95d1656390ec1ccc1849f4b70f7a8dc6033164d75e0a3d003c74ca69fdf9929b1e012fecc1a172c6e051f13d4475af3e09dc19bbe146c51d0a6c3e154e96e82f5d0eb76b6af9e570533cd26c6a7f74a206", "0e05a75c5029663ae4c41d91d0a651c38995b2407341469a33a67991f2cf710bf020692d4449b753927b46dae0b6dc4f440f7ad011ce43b794170c52fd5a3f0b51639667d564eca23abc5f038d778a02becc61f05f096ef93c3886eba0da4b0235be2f3268e420eadeda6522a2c5ec5a988497458f0c9d18d20d9436c8333001"] }


Less details