Tx hash: 48958303ecf1a0581fb190acb2d61e06ee03c2dc5f412b4a4fc3b10dc600d5e3

Tx prefix hash: db55ecb5d14cf2cd4b12d1c7eaf10d668ce9e0d55eebbe939558e4ee078cef70
Tx public key: 8afd4e4a2d05ec1c5c737d490e824a786380dd9a4d3e3c3e03d9b8f8c0dd74a2
Timestamp: 1513071488 Timestamp [UCT]: 2017-12-12 09:38:08 Age [y:d:h:m:s]: 08:142:20:27:11
Block: 64239 Fee: 0.000001 Tx size: 0.3047 kB
Tx version: 1 No of confirmations: 3922568 RingCT/type: no
Extra: 018afd4e4a2d05ec1c5c737d490e824a786380dd9a4d3e3c3e03d9b8f8c0dd74a2

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 18e9ccc488a93c8d7ef634eb58b3fe2ee2cd293424d8d46ed4ac97b53fa21bab 0.00 406613 of 1331469
01: 8b9924dc5ae2dbf5fabb3e33ba7387cd9d5a506824212e02590ced1d6ca7daa0 0.00 121796 of 862456

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-12 08:23:22 till 2017-12-12 10:24:13; resolution: 0.000494 days)

  • |______________________________________________________________________________________*___________________________________________________________________________________|
  • |____________________________________________________________________________________*_____________________________________________________________________________________|

2 inputs(s) for total of 0.00 etn

key image 00: f60ee216f15bc067a76719de3e36219b93cf2433b5146b7b24edb3e726a8038d amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8a53cbc53aab06329b2aecd594d8a0f1bfa882b631d9a4f79695b5867e2288c0 00064227 1 3/6 2017-12-12 09:24:13 08:142:20:41:06
key image 01: ae743a68f5076d406906a4648ef1f7cc896e4a82221985f4a2125c7299a9b372 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3d1c49c69d0db5e56e119b0b24783dbda7a7f029465cdc2a299e91ec5797e9a7 00064226 1 2/4 2017-12-12 09:23:22 08:142:20:41:57
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 9, "key_offsets": [ 190713 ], "k_image": "f60ee216f15bc067a76719de3e36219b93cf2433b5146b7b24edb3e726a8038d" } }, { "key": { "amount": 500, "key_offsets": [ 406438 ], "k_image": "ae743a68f5076d406906a4648ef1f7cc896e4a82221985f4a2125c7299a9b372" } } ], "vout": [ { "amount": 500, "target": { "key": "18e9ccc488a93c8d7ef634eb58b3fe2ee2cd293424d8d46ed4ac97b53fa21bab" } }, { "amount": 8, "target": { "key": "8b9924dc5ae2dbf5fabb3e33ba7387cd9d5a506824212e02590ced1d6ca7daa0" } } ], "extra": [ 1, 138, 253, 78, 74, 45, 5, 236, 28, 92, 115, 125, 73, 14, 130, 74, 120, 99, 128, 221, 154, 77, 62, 60, 62, 3, 217, 184, 248, 192, 221, 116, 162 ], "signatures": [ "1b077fb42926d914e16e4db2112e4cebbf8845f7ebda4b6a86f9c634aac4670b99b10480a138f1443a41ceb1d276b988d54e36177a11626a240352cb3990750b", "9d863ba476c086cd7d8c337d449613cd282e85701b96cd34f5ef6e55fcf004081ade64763179150be8fa8231107c50c1cadb74dc121250f91f7ed58232ef680e"] }


Less details