Tx hash: 4301abc4279b400239276bba7c6776dfbb0f1dfff9f5d26b9a70d423aaa69c46

Tx prefix hash: 9b47a061a5c0906ec6cbc7bb1ed4f177de4af397ec82f631703951562407efa9
Tx public key: fa0db5e7f912d7743f7dd2163ad3f825d1ae327fb04b012d88b16cafea3988c7
Timestamp: 1512761256 Timestamp [UCT]: 2017-12-08 19:27:36 Age [y:d:h:m:s]: 08:145:03:41:38
Block: 58931 Fee: 0.000001 Tx size: 0.3047 kB
Tx version: 1 No of confirmations: 3926082 RingCT/type: no
Extra: 01fa0db5e7f912d7743f7dd2163ad3f825d1ae327fb04b012d88b16cafea3988c7

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: ebae558732083228bd46b0bbfffb6921cdfa2458f20fb2a2ce2a1d570e42fd56 0.00 95903 of 862456
01: 547ee11ec4987f8e4ebf6d20c38be1efc8c351ad2da6e0c79bbb996069d721bf 0.00 350466 of 1331469

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-08 17:25:07 till 2017-12-08 19:39:05; resolution: 0.000547 days)

  • |______________________________________________________________________________________________*___________________________________________________________________________|
  • |____________________________________________________________________________*_____________________________________________________________________________________________|

2 inputs(s) for total of 0.00 etn

key image 00: 5add308409bc416e1400c762394c8ea61d4274cf5adcbb61fcb3e782a55335a2 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: cb3c1fcb307446cba43a6efd0a60a9312ea87e7444ce7d82d077b6511e7c69b6 00058887 1 1/5 2017-12-08 18:39:05 08:145:04:30:09
key image 01: 15026ecdc77c0e1699b8ee6c635a6152e67b25c5f74b2d40c4a13273c59b4edf amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8419f0ec86f205cb17346d4d5d15d441757066b7f2a4f99fd2ba59c5f1d0252e 00058872 1 2/5 2017-12-08 18:25:07 08:145:04:44:07
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 9, "key_offsets": [ 126930 ], "k_image": "5add308409bc416e1400c762394c8ea61d4274cf5adcbb61fcb3e782a55335a2" } }, { "key": { "amount": 500, "key_offsets": [ 349575 ], "k_image": "15026ecdc77c0e1699b8ee6c635a6152e67b25c5f74b2d40c4a13273c59b4edf" } } ], "vout": [ { "amount": 8, "target": { "key": "ebae558732083228bd46b0bbfffb6921cdfa2458f20fb2a2ce2a1d570e42fd56" } }, { "amount": 500, "target": { "key": "547ee11ec4987f8e4ebf6d20c38be1efc8c351ad2da6e0c79bbb996069d721bf" } } ], "extra": [ 1, 250, 13, 181, 231, 249, 18, 215, 116, 63, 125, 210, 22, 58, 211, 248, 37, 209, 174, 50, 127, 176, 75, 1, 45, 136, 177, 108, 175, 234, 57, 136, 199 ], "signatures": [ "539ffc40798a9c98e2cff84d8733ded19fbcf970cd1907c45df3672376b756007b5c39c1d6157b6366155a615bc999eb4a9bdcff305ad55550c8439b7051840d", "a9714ab315131f9f12ab4eaafd241e907c707e80dcf684939d0eb8ca5a345602852c5048c2f01b894db4df071aa0dea3ead07fe5ab932be510cdbef175554a07"] }


Less details