Tx hash: 4078ec7b507625a83ecd6fa3a79fea40c5de819e25e031e5ea5f5ee1362d10a6

Tx prefix hash: 1c36ccd0c45f3a5f9cbfebd678721c25082a12ea367354b8d7b16cb5da0d6217
Tx public key: 12c6b38edc758ee67a57fd0b725a5a142d2e0bcc7bd230a7b69133a623c30979
Timestamp: 1512749562 Timestamp [UCT]: 2017-12-08 16:12:42 Age [y:d:h:m:s]: 08:156:21:56:21
Block: 58738 Fee: 0.000002 Tx size: 0.4053 kB
Tx version: 1 No of confirmations: 3942471 RingCT/type: no
Extra: 0112c6b38edc758ee67a57fd0b725a5a142d2e0bcc7bd230a7b69133a623c30979

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: da392e4c4919283dcfedd2ff5dbcaa74bda7b7bb669f0cdf877668b05430627e 0.00 485507 of 2212696
01: 6879befda5d3d9d59cd9802a7cf29cc646a7a8b8838528bf87d31de0de9c43b2 0.00 243901 of 1012165

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-08 14:45:08 till 2017-12-08 16:49:09; resolution: 0.000507 days)

  • |____________________________________________________________________________________*_____________________________________________________________________________________|
  • |________________________________________________________________________________________*_________________________________________________________________________________|
  • |__________________________________________________________________________________*_______________________________________________________________________________________|

3 inputs(s) for total of 0.00 etn

key image 00: f675c85711ccce0bd5a22c35a7543d6f0bde3531b425be441ea7697686a3aa49 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: cb23aa9d00622443fa5adad41898d5af2040506d8d778011076746a1cbc887bd 00058712 1 4/4 2017-12-08 15:46:46 08:156:22:22:17
key image 01: f83d454f1f42ac0a6348369ee3df0f13392c603ee2539063bf2b415f9a03d1f1 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 47fb0c1a21742801d5b72aca4e85d92e999f9fb1c2c8a0690298bd6a711dd94c 00058715 1 3/7 2017-12-08 15:49:09 08:156:22:19:54
key image 02: a68141ac488bc47e73c5b8e584e8df0d13b41683b1dc05841ea410ac452c0013 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 71b005ced263192680085ec8aa8c8322edc4746ebb76ada9db5c578481b7eb47 00058711 1 2/3 2017-12-08 15:45:08 08:156:22:23:55
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 400, "key_offsets": [ 335421 ], "k_image": "f675c85711ccce0bd5a22c35a7543d6f0bde3531b425be441ea7697686a3aa49" } }, { "key": { "amount": 2, "key_offsets": [ 29306 ], "k_image": "f83d454f1f42ac0a6348369ee3df0f13392c603ee2539063bf2b415f9a03d1f1" } }, { "key": { "amount": 400, "key_offsets": [ 335388 ], "k_image": "a68141ac488bc47e73c5b8e584e8df0d13b41683b1dc05841ea410ac452c0013" } } ], "vout": [ { "amount": 100, "target": { "key": "da392e4c4919283dcfedd2ff5dbcaa74bda7b7bb669f0cdf877668b05430627e" } }, { "amount": 700, "target": { "key": "6879befda5d3d9d59cd9802a7cf29cc646a7a8b8838528bf87d31de0de9c43b2" } } ], "extra": [ 1, 18, 198, 179, 142, 220, 117, 142, 230, 122, 87, 253, 11, 114, 90, 90, 20, 45, 46, 11, 204, 123, 210, 48, 167, 182, 145, 51, 166, 35, 195, 9, 121 ], "signatures": [ "19c690df88cca892b8633b07a07cbde834300daa64df70471f53059b1342d40fc7d3c74f8b3b0b187cd97b7dcc4f5820076c4b01221245370ddd0cf6fff7cb0a", "93566aeb06300c66782420e905012022ced0dd9cdef113f144e8c6cb7f85f108602a6220a060bde7c450830555188aaa272804145e7b32c3d8439b157a9cb40d", "0ea67d3bffb7f9431638d73f130f4b8039e18e64063d6e88b3bf46dc618c580596ac16e1753b5e6f30a5df69f964b154e35d0541c06406da10a7984bcee79300"] }


Less details