Tx hash: 339bf0f0fae32544bfdb37d909a6c635262b23ec2d5e592cd9a6a1b540784539

Tx prefix hash: 57453aadf1f6f43b6d27b021f4d4a86b4b63cafed8b92ffe38181ca7e87158b1
Tx public key: f8f31290c6f7c6ade3254ecf178693d3bcc4f2e441df474af7359340a55f8392
Timestamp: 1516616893 Timestamp [UCT]: 2018-01-22 10:28:13 Age [y:d:h:m:s]: 08:102:11:44:28
Block: 123303 Fee: 0.000001 Tx size: 0.4346 kB
Tx version: 1 No of confirmations: 3864443 RingCT/type: no
Extra: 01f8f31290c6f7c6ade3254ecf178693d3bcc4f2e441df474af7359340a55f8392

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: ff87dbfc9a40601ff5a882023b8d9ce762a1b3ee4eb7a11d5eb9ec264b38b21b 0.00 331699 of 862456
01: b40196e68fed906e0421fed64ee88e6807627827131f918f71aa79c9d96ddc81 0.00 383953 of 685326

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-10 09:45:59 till 2018-01-22 11:11:12; resolution: 0.253289 days)

  • |_*_______________________________________________________________________________________________________________________________________________________________________*|
  • |_________________________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 0.00 etn

key image 00: eac8920d5a2d6cb758787336d77fffee57acdc980a755d3763df2145234a5dfc amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1c14110c5c3e964cc598be9b6aa7dd6f553a0df583bf9598b3a31e3c9d00ebe0 00061447 1 1/5 2017-12-10 10:45:59 08:145:11:26:42
- 01: fb1c5de8b2f200a12ecc33249850ee047a94ff2633ce66e1f35111b55dd41a0b 00123288 2 2/7 2018-01-22 10:11:12 08:102:12:01:29
key image 01: 53bee6c8d594edcc59c0a0c6c85e5f889a5d02d455958155f78677c4f77a1ac8 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 10c7846344f1195e0d614eaac032b4e396e8390c1cef9a045023a4f70a0bfc43 00123164 2 9/8 2018-01-22 07:42:52 08:102:14:29:49
- 01: ca70dd2d7846806cd1c03a4021412443894d3f7a51648578468b32da69ccb26e 00123288 2 2/7 2018-01-22 10:11:12 08:102:12:01:29
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 9, "key_offsets": [ 160423, 361376 ], "k_image": "eac8920d5a2d6cb758787336d77fffee57acdc980a755d3763df2145234a5dfc" } }, { "key": { "amount": 4000, "key_offsets": [ 383656, 285 ], "k_image": "53bee6c8d594edcc59c0a0c6c85e5f889a5d02d455958155f78677c4f77a1ac8" } } ], "vout": [ { "amount": 8, "target": { "key": "ff87dbfc9a40601ff5a882023b8d9ce762a1b3ee4eb7a11d5eb9ec264b38b21b" } }, { "amount": 4000, "target": { "key": "b40196e68fed906e0421fed64ee88e6807627827131f918f71aa79c9d96ddc81" } } ], "extra": [ 1, 248, 243, 18, 144, 198, 247, 198, 173, 227, 37, 78, 207, 23, 134, 147, 211, 188, 196, 242, 228, 65, 223, 71, 74, 247, 53, 147, 64, 165, 95, 131, 146 ], "signatures": [ "1e66eef1bc575342db29152d21d5f005d350f81712fe5dff0cbda6cd25a5fa0d428572229f4d28b8e0b5ae81899357c0c998bd3fef859ab73442493a49114f0d4656be594ffb66f25653ac5e17b3038e75e5dbcbb46a2a8b705db4417ca5b500402430a314b1bce5daa77a93578dc39ce33b72144f8634d800dc011ad997760c", "8f120467dd09ded5721c8b7f3bfad209ea38ad9349fa822c7cd84a671220560b3b17bae64acabb4e87102d5f6dd132d8d495f99f4aba09c91e2a82884c297307aa53dc84f953c5b517b553d10b66b00bfd1f333a2879d9652b32224db5479808a57bc48ecf189f1bf0c8b7e8b52639e29ea17539f2e0ec46aac440dd5ec81107"] }


Less details