Tx hash: 47413f34b59d086a422def14e722a366ab4cea9a9846a5377c8a5eb0c7b0e7af

Tx prefix hash: 2bcda95f8816f0afe84a58aa6224bc27bb716d957d6be036c6870c433bcb99b2
Tx public key: 08c090bb9f69fe79645075262bdca2e0902493d25c5fb9a480e855e542ad7277
Timestamp: 1514075453 Timestamp [UCT]: 2017-12-24 00:30:53 Age [y:d:h:m:s]: 08:133:00:19:49
Block: 80861 Fee: 0.000001 Tx size: 0.4053 kB
Tx version: 1 No of confirmations: 3908426 RingCT/type: no
Extra: 0108c090bb9f69fe79645075262bdca2e0902493d25c5fb9a480e855e542ad7277

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: c3980a89de4ad82f32323893997ded280b201bcf674e68dbc902628930b829bf 0.00 414720 of 1012165
01: dc40e3588dd4cbfddf65ddbf8be7e8f6d50366fde0a56436de3885cca431dbdd 0.00 209113 of 862456

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-23 23:20:29 till 2017-12-24 01:21:15; resolution: 0.000493 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |______________________________________________________________________________________*___________________________________________________________________________________|
  • |____________________________________________________________________________________*_____________________________________________________________________________________|

3 inputs(s) for total of 0.00 etn

key image 00: 71e33ad793f57e9045af7b943527aaa71f24682ae627a39dc3a3dfdb39804adf amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5fbd9fac6c066cfd4582dff44d12edc020db7bc3633ae50a410d54cf097b6a39 00080849 1 3/4 2017-12-24 00:20:47 08:133:00:29:55
key image 01: c851b48cbfa34a5a52e7a182e19220bee8645848757888473c482d33d6ebf340 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 39345de78b685bc7c35b4edcd3848966e36a707973e05eb56aa8c1e0fbd4bdf1 00080850 1 1/5 2017-12-24 00:21:15 08:133:00:29:27
key image 02: 4d9a56e1eb6a0526047274413c3ae47751429c17fc8621c273c9c90060cb3fa9 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 72fa240f751426d34215839a0d816e4ac63585e3a5bfa232439490c585f9cd6b 00080848 1 4/7 2017-12-24 00:20:29 08:133:00:30:13
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 300, "key_offsets": [ 652180 ], "k_image": "71e33ad793f57e9045af7b943527aaa71f24682ae627a39dc3a3dfdb39804adf" } }, { "key": { "amount": 9, "key_offsets": [ 338445 ], "k_image": "c851b48cbfa34a5a52e7a182e19220bee8645848757888473c482d33d6ebf340" } }, { "key": { "amount": 400, "key_offsets": [ 538332 ], "k_image": "4d9a56e1eb6a0526047274413c3ae47751429c17fc8621c273c9c90060cb3fa9" } } ], "vout": [ { "amount": 700, "target": { "key": "c3980a89de4ad82f32323893997ded280b201bcf674e68dbc902628930b829bf" } }, { "amount": 8, "target": { "key": "dc40e3588dd4cbfddf65ddbf8be7e8f6d50366fde0a56436de3885cca431dbdd" } } ], "extra": [ 1, 8, 192, 144, 187, 159, 105, 254, 121, 100, 80, 117, 38, 43, 220, 162, 224, 144, 36, 147, 210, 92, 95, 185, 164, 128, 232, 85, 229, 66, 173, 114, 119 ], "signatures": [ "f08a0148e17785c784ca02d63c554e2805949afb1d4af75ba61aeb29c68f7f099f50e9c97c0a951f81a67ccd6a0e056fc4abbf510b14f2e34d3f741e87609705", "a890ab8e62733f8a6b9e940f4769180becb1308a6da3d8612260b3b5685e350fe4f7094fa6deff87c79a0066841df8bd30b9d1d6fe89aa23a39ebb911ef91700", "70b1da3e3489a535cc4da23ad4274a98b85493c1a0298a8785510f79c3f8d703c2f57b6b34cc15cd35af34129231a5eb579862dd01d0ee115f0e5298daa2a408"] }


Less details