Tx hash: 30732192c71c37e8df1f725b7a8c26d8cbc118d855c07d4b484b8accfced6820

Tx prefix hash: d79ea43e2f73910d37bffcd89105f8d6263a2ec1e6b4b6cbbd5436365cc2d1cc
Tx public key: b26ff8759260b7aafba11727b7b98b690bb3d9406482eb2abc494c40ba392b1d
Payment id: 00000000000000000000000000000000000000005aaff6781e789d3fec5a7131
Payment id as ascii ([a-zA-Z0-9 /!]): ZxxZq1
Timestamp: 1524131527 Timestamp [UCT]: 2018-04-19 09:52:07 Age [y:d:h:m:s]: 08:014:19:22:32
Block: 248471 Fee: 0.000020 Tx size: 0.3037 kB
Tx version: 1 No of confirmations: 3738292 RingCT/type: no
Extra: 02210000000000000000000000000000000000000000005aaff6781e789d3fec5a713101b26ff8759260b7aafba11727b7b98b690bb3d9406482eb2abc494c40ba392b1d

1 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 64959a0bb66dac8ae5488dd4e652516f59634ef71e164c3201a799c5b99145ae 0.00 1868478 of 2212696

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-04-19 08:43:17 till 2018-04-19 10:43:17; resolution: 0.000490 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|

2 inputs(s) for total of 0.00 etn

key image 00: 5b422436753cc150200541918d1145faeb1ae042da2fbbdf3da5f9c9c8133377 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 30c60cc1fc322b8343945525cc5d59180883e9006859c6ac08e3aa85e66986d8 00248461 1 6/8 2018-04-19 09:43:17 08:014:19:31:22
key image 01: cedd60219d1895378473ad82320e24e8ef768360a13744db1835b2999b111116 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 78bc10b00395c645f13b063b5936764316619a356a8d1a7b4aec4a4cc67668db 00248461 1 6/8 2018-04-19 09:43:17 08:014:19:31:22
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 100, "key_offsets": [ 1868474 ], "k_image": "5b422436753cc150200541918d1145faeb1ae042da2fbbdf3da5f9c9c8133377" } }, { "key": { "amount": 20, "key_offsets": [ 655650 ], "k_image": "cedd60219d1895378473ad82320e24e8ef768360a13744db1835b2999b111116" } } ], "vout": [ { "amount": 100, "target": { "key": "64959a0bb66dac8ae5488dd4e652516f59634ef71e164c3201a799c5b99145ae" } } ], "extra": [ 2, 33, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 90, 175, 246, 120, 30, 120, 157, 63, 236, 90, 113, 49, 1, 178, 111, 248, 117, 146, 96, 183, 170, 251, 161, 23, 39, 183, 185, 139, 105, 11, 179, 217, 64, 100, 130, 235, 42, 188, 73, 76, 64, 186, 57, 43, 29 ], "signatures": [ "d657d5f074767e37fefbf8d9ebb503d89125622480936ae198bc6cab689743016011c175990312edc5dd4d4737b5616289015c0a53a55f0ff62e3e10028b2309", "1a3e17477e126eda277380e1b260ce741d526f1ead63633123ebb38526544202ba5827027ba226e4d38c29fe1bf71c0dad97ea0c732957291a44d26c55aa340b"] }


Less details