Tx hash: 2f9e160138ad22a6fe1214203f10e9a3daa03294addd484a2064e8838ae8a6e4

Tx prefix hash: 4fc8e19cf16768a6b07f815f7a7d8aae9450e900b159e95b19eda4c888c65744
Tx public key: 18cb7de3d19630fb4fc586382199dad1459b8253d078b7d66b8a6d878e538ce9
Timestamp: 1513209428 Timestamp [UCT]: 2017-12-13 23:57:08 Age [y:d:h:m:s]: 08:141:21:54:08
Block: 66343 Fee: 0.000001 Tx size: 0.4043 kB
Tx version: 1 No of confirmations: 3921386 RingCT/type: no
Extra: 0118cb7de3d19630fb4fc586382199dad1459b8253d078b7d66b8a6d878e538ce9

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 30e0b94c89079d5c21160808081016fb24f2b1f072ad2aa2139e23d9e7f019b6 0.00 427045 of 1331469
01: f2887831e2185082591e88c2482f4bb5ca8a7c529705d052ac12dd4b63a272f0 0.00 213909 of 1204163

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-13 21:04:59 till 2017-12-13 23:09:48; resolution: 0.000510 days)

  • |________________________________________________________________________________________*_________________________________________________________________________________|
  • |__________________________________________________________________________________*_______________________________________________________________________________________|
  • |________________________________________________________________________________________*_________________________________________________________________________________|

3 inputs(s) for total of 0.00 etn

key image 00: b06cb0dd6ec1206a12e9ad2c06e467ba46abb0e86506609ebafcaba4afb8f750 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8545ec97f8d46868c47fa11afca1d58a25882d8142dc79d7a9373d8d8b8e6ec4 00066248 1 5/6 2017-12-13 22:09:48 08:141:23:41:28
key image 01: 741e5bd35016e4a6cad2c98acd909f8013a3346d6ecd856f44f734a80fd6a2b9 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6d1c1b7ef002ec5d699366b3231b8de1c0b41594760cae35222bdb740ec9d7a1 00066247 1 1/5 2017-12-13 22:04:59 08:141:23:46:17
key image 02: 3b97021e9e3fa47849587cdd0ba302d4aa8e3e79e7ad66ac403942651f7941c1 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: cc7b8e800e66339e223879d62549ac5b4de86f6d9efbb3b08ec220a4b2769a89 00066248 1 10/7 2017-12-13 22:09:48 08:141:23:41:28
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 20, "key_offsets": [ 147990 ], "k_image": "b06cb0dd6ec1206a12e9ad2c06e467ba46abb0e86506609ebafcaba4afb8f750" } }, { "key": { "amount": 90, "key_offsets": [ 301485 ], "k_image": "741e5bd35016e4a6cad2c98acd909f8013a3346d6ecd856f44f734a80fd6a2b9" } }, { "key": { "amount": 400, "key_offsets": [ 410434 ], "k_image": "3b97021e9e3fa47849587cdd0ba302d4aa8e3e79e7ad66ac403942651f7941c1" } } ], "vout": [ { "amount": 500, "target": { "key": "30e0b94c89079d5c21160808081016fb24f2b1f072ad2aa2139e23d9e7f019b6" } }, { "amount": 9, "target": { "key": "f2887831e2185082591e88c2482f4bb5ca8a7c529705d052ac12dd4b63a272f0" } } ], "extra": [ 1, 24, 203, 125, 227, 209, 150, 48, 251, 79, 197, 134, 56, 33, 153, 218, 209, 69, 155, 130, 83, 208, 120, 183, 214, 107, 138, 109, 135, 142, 83, 140, 233 ], "signatures": [ "e3d8c528e1830fa7720f8dbc69771115b347a3722fab489373847d503de9b0014f1d83dc02417b7ffb250dcf3d23726acb0e5400a53511cf98aae94c295cf80f", "2257f30f0d575e4bf45b4bdec727d0784097d4e7622c52d8278e7a7b1d03db080b8fda0be6c9d3fe46aea947d444ed46983b2c9de768e673f6164625d3e9fe03", "1866764897746b3529664a3e091cfcafcd7ac2ea46e0ad9fdd4810fe91a748017d41eab5e0165466e285a8462d57b5ed157e71eef9e9e7c7ba9906a6d51c4107"] }


Less details