Tx hash: 491603a474f723b62a9307bc812e65514d892c7cbb5825d9948366517e0220e8

Tx prefix hash: 1fc9cc8eaf61e4e3aac1df053902e3886d5ba5e027a26a479233d07652dc8f52
Tx public key: 0e47a7464ac601ee9a0e8c9e16af0b61dbb5a173cc78417428383077ec175110
Timestamp: 1512875421 Timestamp [UCT]: 2017-12-10 03:10:21 Age [y:d:h:m:s]: 08:144:01:55:45
Block: 60979 Fee: 0.000001 Tx size: 0.3047 kB
Tx version: 1 No of confirmations: 3924379 RingCT/type: no
Extra: 010e47a7464ac601ee9a0e8c9e16af0b61dbb5a173cc78417428383077ec175110

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 26227fc5a7fcaf2859229c538185487c15403eb63697c5ce971fd36c5ba5d498 0.00 264325 of 1012165
01: 7c8e3d4ce37ea0c62c9be79251fc96047e18664cf3474f93a808049b6097654d 0.00 153865 of 1204163

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-10 01:54:17 till 2017-12-10 03:55:11; resolution: 0.000494 days)

  • |____________________________________________________________________________________*_____________________________________________________________________________________|
  • |______________________________________________________________________________________*___________________________________________________________________________________|

2 inputs(s) for total of 0.00 etn

key image 00: 025d7d8d0a694864e13f9f8ec8c6f11dbd5269208aca175cd8b3de0df4d27779 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f875f62be3463192433a690daafe3e3fde6d068f60cba89c6206e11962ba21a7 00060963 1 1/6 2017-12-10 02:54:17 08:144:02:11:49
key image 01: 006c4451ef5eb4c33aa77c2854ec6bbf8ec7c074938bd1717d9e44d9fb698dbf amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 77d3b0335bd05ba87e4ff6805dbf0478b31e88f15ed3da740fcecd56d4c177e0 00060964 1 3/6 2017-12-10 02:55:11 08:144:02:10:55
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 700, "key_offsets": [ 264186 ], "k_image": "025d7d8d0a694864e13f9f8ec8c6f11dbd5269208aca175cd8b3de0df4d27779" } }, { "key": { "amount": 10, "key_offsets": [ 147014 ], "k_image": "006c4451ef5eb4c33aa77c2854ec6bbf8ec7c074938bd1717d9e44d9fb698dbf" } } ], "vout": [ { "amount": 700, "target": { "key": "26227fc5a7fcaf2859229c538185487c15403eb63697c5ce971fd36c5ba5d498" } }, { "amount": 9, "target": { "key": "7c8e3d4ce37ea0c62c9be79251fc96047e18664cf3474f93a808049b6097654d" } } ], "extra": [ 1, 14, 71, 167, 70, 74, 198, 1, 238, 154, 14, 140, 158, 22, 175, 11, 97, 219, 181, 161, 115, 204, 120, 65, 116, 40, 56, 48, 119, 236, 23, 81, 16 ], "signatures": [ "6d58ecb55edc685b4d50cbc65db40edd01e8979a224becb328baa379ebd5640befb2fce49cbe974f952b23dd528442e31b5d811a33fd40b0249b452d4443e40e", "34c1103b29c393b612842689cf3cd7908b4445c15a972398349d2b0444bfc90db29d637f05fafd0022526ed58c4c74c6bffc056aa480583bdc199779d16ddb07"] }


Less details