Tx hash: 4a506efe7d0a47aabebbaa32bd0351f53c19b02f84591ce4d7404593ecac9568

Tx prefix hash: 4de0ea146c207182d20fbc7e40f3540da2b97061b72632588deb70333568b401
Tx public key: e16f06f3485a4eda56efecb6e489fa46d3e682ff2cf56285b279b0ee921d642d
Timestamp: 1512327990 Timestamp [UCT]: 2017-12-03 19:06:30 Age [y:d:h:m:s]: 08:151:14:21:58
Block: 52040 Fee: 0.000001 Tx size: 0.3730 kB
Tx version: 1 No of confirmations: 3934966 RingCT/type: no
Extra: 01e16f06f3485a4eda56efecb6e489fa46d3e682ff2cf56285b279b0ee921d642d

4 output(s) for total of 0.01 ETNX

stealth address amount amount idx
00: 6c00e096ca515df31c9a4f1b1c5b1e0ebdcae8f4a2bfd786cb7811f75bc3ebf7 0.00 291742 of 1331469
01: 24af6734c3b83ce5572e97d6bc62fc0314ed1e8ddc3c32d568afd10ce47e7133 0.00 291743 of 1331469
02: 10cf87482d4b1362532d3ffe6973f2486caa7eb3a6c52e8794ae41031f23311b 0.00 70353 of 862456
03: 29b1f9eed014641c707d648b28663906037ae5b2487963de8e519fd2d0c0004d 0.01 83571 of 548684

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-03 17:50:24 till 2017-12-03 19:50:24; resolution: 0.000490 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|

2 inputs(s) for total of 0.01 etn

key image 00: 08c6e338e2b0dc4501192102aa18c7e6733ca643f497917afbda9f9b8b6b89d8 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d6a19603c200cb51cde9b0d787f1f922d82b0ebe4d6f48cd9b5f6293664a84c6 00052022 1 2/5 2017-12-03 18:50:24 08:151:14:38:04
key image 01: 1c09417765ff60d33fbec3fe47ca8fbec7cc59701b811bf95e0fc64c64cd9582 amount: 0.01
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 48d6dcd154a6392dddd735179bb34227c42cb5be1652003f229633d078065fad 00052022 1 2/4 2017-12-03 18:50:24 08:151:14:38:04
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 9, "key_offsets": [ 67152 ], "k_image": "08c6e338e2b0dc4501192102aa18c7e6733ca643f497917afbda9f9b8b6b89d8" } }, { "key": { "amount": 7000, "key_offsets": [ 76319 ], "k_image": "1c09417765ff60d33fbec3fe47ca8fbec7cc59701b811bf95e0fc64c64cd9582" } } ], "vout": [ { "amount": 500, "target": { "key": "6c00e096ca515df31c9a4f1b1c5b1e0ebdcae8f4a2bfd786cb7811f75bc3ebf7" } }, { "amount": 500, "target": { "key": "24af6734c3b83ce5572e97d6bc62fc0314ed1e8ddc3c32d568afd10ce47e7133" } }, { "amount": 8, "target": { "key": "10cf87482d4b1362532d3ffe6973f2486caa7eb3a6c52e8794ae41031f23311b" } }, { "amount": 6000, "target": { "key": "29b1f9eed014641c707d648b28663906037ae5b2487963de8e519fd2d0c0004d" } } ], "extra": [ 1, 225, 111, 6, 243, 72, 90, 78, 218, 86, 239, 236, 182, 228, 137, 250, 70, 211, 230, 130, 255, 44, 245, 98, 133, 178, 121, 176, 238, 146, 29, 100, 45 ], "signatures": [ "229f08349335c2072b0b468ec81c8a6717c080b2f3b34656b42fe6e6f8054204d32e294e625050d978e957fb0d6bc85b98007d1ce2aa4dbefaabc26ac35d5c0a", "12e130ac4d8ea8e2367d825fbf8e81bfa5f833f3c4c25417e198075ff18b8f01f7a3952e3f9eebdc0af075a79b28b4d23bd580e2fbdce2a1ffac3a1665561906"] }


Less details