Tx hash: 40202a0ead976474c59309ace13fe8b669942b59ce8956071dd91f70cc9af600

Tx prefix hash: bbdd4590d3f2976ac96c5fd665fca983595d3b8c57aca4f7111be4ec04716507
Tx public key: df008758ad6593af476c63ffbb783e73c3bc3b19caea0cf3ba745440aefbffb2
Timestamp: 1513060828 Timestamp [UCT]: 2017-12-12 06:40:28 Age [y:d:h:m:s]: 08:143:16:45:10
Block: 64064 Fee: 0.000001 Tx size: 0.3730 kB
Tx version: 1 No of confirmations: 3923757 RingCT/type: no
Extra: 01df008758ad6593af476c63ffbb783e73c3bc3b19caea0cf3ba745440aefbffb2

4 output(s) for total of 0.01 ETNX

stealth address amount amount idx
00: 05a534b18e25a68b7b8f002c901e9948d6a1a1023a14af67ec4295cd4c0edaf0 0.00 405053 of 1331469
01: ed3dea0cb1317585ed7c8305ac018a3b90c9d55b5a80a4f154f36a45f1753788 0.00 405054 of 1331469
02: 36c636f1172ec1c011e6bfbb0d89b6d2eff90394880f3ea4d13ca9b7ae2480b5 0.01 123239 of 727829
03: 86b07342111671018de155b5c64888f8be009a803a19282c0d946a9edb4b226b 0.00 59368 of 714591

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-12 04:43:57 till 2017-12-12 06:46:31; resolution: 0.000501 days)

  • |___________________________________________________________________________________*______________________________________________________________________________________|
  • |_______________________________________________________________________________________*__________________________________________________________________________________|

2 inputs(s) for total of 0.01 etn

key image 00: 4c8bdb14d7ba7a65aa73374cc4127d4bb9b9180e5a6ade27b2db05d952b195fc amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ba0332aad24ec25567549cc422caa3214a005877a14033fb4565770ef7eae45f 00063996 1 3/4 2017-12-12 05:43:57 08:143:17:41:41
key image 01: 498ec1df65f759a28d96b26aa315a13089ea45fea6f625bab980e11b4c54f327 amount: 0.01
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5740c1fe959a95ff2b1cea5ee895d800343203f6b98f1c1d3d9c59f1087dd70e 00063998 1 14/7 2017-12-12 05:46:31 08:143:17:39:07
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 7, "key_offsets": [ 124973 ], "k_image": "4c8bdb14d7ba7a65aa73374cc4127d4bb9b9180e5a6ade27b2db05d952b195fc" } }, { "key": { "amount": 10000, "key_offsets": [ 255811 ], "k_image": "498ec1df65f759a28d96b26aa315a13089ea45fea6f625bab980e11b4c54f327" } } ], "vout": [ { "amount": 500, "target": { "key": "05a534b18e25a68b7b8f002c901e9948d6a1a1023a14af67ec4295cd4c0edaf0" } }, { "amount": 500, "target": { "key": "ed3dea0cb1317585ed7c8305ac018a3b90c9d55b5a80a4f154f36a45f1753788" } }, { "amount": 9000, "target": { "key": "36c636f1172ec1c011e6bfbb0d89b6d2eff90394880f3ea4d13ca9b7ae2480b5" } }, { "amount": 6, "target": { "key": "86b07342111671018de155b5c64888f8be009a803a19282c0d946a9edb4b226b" } } ], "extra": [ 1, 223, 0, 135, 88, 173, 101, 147, 175, 71, 108, 99, 255, 187, 120, 62, 115, 195, 188, 59, 25, 202, 234, 12, 243, 186, 116, 84, 64, 174, 251, 255, 178 ], "signatures": [ "f940e2cb0faa8ed2fa4f912c27660cbcad5f56d86ecf9fc477722c34049c220b2ca5d1f43e3562046cc40812eb41b18887c53ec0bc3ba356cfdebb433beece05", "0a9ebf95efd082b62c3973d88fdc9e66c86f15c2d33aa1566d73eabe9ff33f04c91b34b32cb3dc258706f33ea177f1c9ab1dda535bd4806584e4cb4e762bfe0e"] }


Less details