Tx hash: 406bdd8d1f304c707828dd6951e5e43a751b48ab5e7cfd24447d91f588729ab8

Tx prefix hash: ac3999b073703fd8a88e202fd17727fc8ff3993d4c33ae3486c5e1844e902a92
Tx public key: 58ee4b5fb640bbb55fbf2087334fdb731392ae97b2f3954f93604791933b329e
Payment id: 626974626e733e1101f99c22daabc7f0f1c68e10fa93e0ba9c79241223fab532
Payment id as ascii ([a-zA-Z0-9 /!]): bitbnsy2
Timestamp: 1527387789 Timestamp [UCT]: 2018-05-27 02:23:09 Age [y:d:h:m:s]: 07:343:11:55:53
Block: 302949 Fee: 0.000001 Tx size: 0.3398 kB
Tx version: 1 No of confirmations: 3685734 RingCT/type: no
Extra: 022100626974626e733e1101f99c22daabc7f0f1c68e10fa93e0ba9c79241223fab5320158ee4b5fb640bbb55fbf2087334fdb731392ae97b2f3954f93604791933b329e

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 40413cdb3a3a06ba478f3748f1d6d2821063bc9ead13beb5c746bca48421ce39 0.00 592883 of 613163
01: 12359b892fb090a46d2376134f64beb0cc824e21d02f8cdbe08a8cf470482d06 0.00 7090065 of 7257418

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-05-25 02:23:08 till 2018-05-26 13:35:17; resolution: 0.008628 days)

  • |_____________________________________________________________________________________________________________________________________________________________________*____|
  • |_____*____________________________________________________________________________________________________________________________________________________________________|

2 inputs(s) for total of 0.00 etn

key image 00: a1f3bbf9e6970cbc531ebed39d3fd1c3f0403f6d4777fbc4fa2ec847a3579178 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c31397e17d94f947f86d25945ceefa5ad69dc908e46ac1994a4a0b16fe892eab 00302104 1 4/130 2018-05-26 12:35:17 07:344:01:43:45
key image 01: 2ba38e7dd59208cfc177dd7fc77b36bdca71e50c27998659da9152d225469c9a amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 78c1244e5d21aba17ddc24d465a9220df4f26cbeaca1b864981cc70d350725d0 00300148 1 9/4 2018-05-25 03:23:08 07:345:10:55:54
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 1000, "key_offsets": [ 7055535 ], "k_image": "a1f3bbf9e6970cbc531ebed39d3fd1c3f0403f6d4777fbc4fa2ec847a3579178" } }, { "key": { "amount": 4, "key_offsets": [ 582312 ], "k_image": "2ba38e7dd59208cfc177dd7fc77b36bdca71e50c27998659da9152d225469c9a" } } ], "vout": [ { "amount": 3, "target": { "key": "40413cdb3a3a06ba478f3748f1d6d2821063bc9ead13beb5c746bca48421ce39" } }, { "amount": 1000, "target": { "key": "12359b892fb090a46d2376134f64beb0cc824e21d02f8cdbe08a8cf470482d06" } } ], "extra": [ 2, 33, 0, 98, 105, 116, 98, 110, 115, 62, 17, 1, 249, 156, 34, 218, 171, 199, 240, 241, 198, 142, 16, 250, 147, 224, 186, 156, 121, 36, 18, 35, 250, 181, 50, 1, 88, 238, 75, 95, 182, 64, 187, 181, 95, 191, 32, 135, 51, 79, 219, 115, 19, 146, 174, 151, 178, 243, 149, 79, 147, 96, 71, 145, 147, 59, 50, 158 ], "signatures": [ "dbbb47647df7b293d90bf339572bc4bbb02a6d447d07a2080c2871d10029670d2dfe617f75d3d6a07f6fdda212e25235facb567f9ab4ef6696a1e6bb27876208", "1457c6877b1732c036a0f1316c0d1fc4b5c4581cf633a1a7a802e56aab797801a597275e6f7303d67a0dfdc83c07054c42fc0adf257397874218a016231d5407"] }


Less details