Tx hash: 50bfdd062b410e28f1ef7dfcac59ea6a8dd298a19695116091d9886810e97cb4

Tx prefix hash: c564e7bd3303e2964eeaac027517b7a031a325df6d2e80d630dd11064378559f
Tx public key: d915f64c046ad7f2770cfbaddc3417d31fb3d26a51ee5c12dff6fbbe52912bd8
Payment id: 9c034b14ceb7238f0fc4f17952c8005bb41f113b070fae092e0dd835a4c78434
Payment id as ascii ([a-zA-Z0-9 /!]): KyR54
Timestamp: 1512683031 Timestamp [UCT]: 2017-12-07 21:43:51 Age [y:d:h:m:s]: 08:146:18:20:15
Block: 57493 Fee: 0.000020 Tx size: 0.3389 kB
Tx version: 1 No of confirmations: 3928498 RingCT/type: no
Extra: 0221009c034b14ceb7238f0fc4f17952c8005bb41f113b070fae092e0dd835a4c7843401d915f64c046ad7f2770cfbaddc3417d31fb3d26a51ee5c12dff6fbbe52912bd8

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: ce0d8eaf899024731cab4ae11782ab2920fe4749feca12d45badc1319bdaee68 0.00 394747 of 1640330
01: 4010e06f14d587eb73f9f662ed45e32e0672e15dac61cfcbb7b455dce4b2ba32 0.00 150370 of 1027483

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-07 19:14:46 till 2017-12-07 21:14:46; resolution: 0.000490 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|

2 inputs(s) for total of 0.00 etn

key image 00: 6b3bcc094c6d4be1849b3b9bd441dc51256fbd65f9167fbc86d3a443c2d1e355 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c2f0e2a252c31174b018e590c4dfe394f538ddd0544417d2e301326a86e634db 00057408 5 1/7 2017-12-07 20:14:46 08:146:19:49:20
key image 01: 11cdc4b9e49fa3830c2162f27f4865b52626541c50ba20973536a1445f0323ce amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1885adc687d3a705fcc770301d2f6c457bdfc9a42afddef14edae385a0ad7fa3 00057408 5 1/7 2017-12-07 20:14:46 08:146:19:49:20
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 100, "key_offsets": [ 467342 ], "k_image": "6b3bcc094c6d4be1849b3b9bd441dc51256fbd65f9167fbc86d3a443c2d1e355" } }, { "key": { "amount": 2000, "key_offsets": [ 393134 ], "k_image": "11cdc4b9e49fa3830c2162f27f4865b52626541c50ba20973536a1445f0323ce" } } ], "vout": [ { "amount": 2000, "target": { "key": "ce0d8eaf899024731cab4ae11782ab2920fe4749feca12d45badc1319bdaee68" } }, { "amount": 80, "target": { "key": "4010e06f14d587eb73f9f662ed45e32e0672e15dac61cfcbb7b455dce4b2ba32" } } ], "extra": [ 2, 33, 0, 156, 3, 75, 20, 206, 183, 35, 143, 15, 196, 241, 121, 82, 200, 0, 91, 180, 31, 17, 59, 7, 15, 174, 9, 46, 13, 216, 53, 164, 199, 132, 52, 1, 217, 21, 246, 76, 4, 106, 215, 242, 119, 12, 251, 173, 220, 52, 23, 211, 31, 179, 210, 106, 81, 238, 92, 18, 223, 246, 251, 190, 82, 145, 43, 216 ], "signatures": [ "bf3f7c1f57a7eecd332b200d5f0b871bae13449807769746f580357f5863800647e95b26eac24dfe253b065e2dec443c3a597e87c38012b20a58116410224e0c", "679a96016011f6b033b1b8b63adfe723beed9305af44a16f52a51c9f09f47f0f3cc3dfe3052054429bceb9a593884a58c015b4dfe05ee6dcea5c965cc4e38008"] }


Less details