Tx hash: 51912433a1591c89d1a803ace5202cda98a9250eb1e236e3ef4ca0a6a33c3cc9

Tx prefix hash: bc249fa8fc9250ce2a524aeccb6a2684994f29cdfe4b90731a450e4c3af3733d
Tx public key: 25351968a0fd755037ce23e12c6f69569e38841b1bfe5493ba399e837b55b052
Timestamp: 1512950394 Timestamp [UCT]: 2017-12-10 23:59:54 Age [y:d:h:m:s]: 08:154:09:59:46
Block: 62177 Fee: 0.000001 Tx size: 0.3730 kB
Tx version: 1 No of confirmations: 3938788 RingCT/type: no
Extra: 0125351968a0fd755037ce23e12c6f69569e38841b1bfe5493ba399e837b55b052

4 output(s) for total of 0.01 ETNX

stealth address amount amount idx
00: 4acf8f5a55bc0d857d91920deb9094bd8acd4338be270b2800888cb50213ef92 0.01 117358 of 508840
01: dc63103f2f7a2da76f29a36313fa6bd39b991523daf0af2464078ca65babd56f 0.00 737215 of 2003140
02: f446876af852421f0b10cf977526cc1fcdf27bf7203f4f7f4c93c70c38611a18 0.00 249225 of 968489
03: cf40ef6504ae14d6f7661788558a606463c3630c3616d4cd0d7aab4a1ae1b8c4 0.00 46256 of 1013510

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-10 22:39:10 till 2017-12-11 00:41:28; resolution: 0.000500 days)

  • |___________________________________________________________________________________*______________________________________________________________________________________|
  • |_______________________________________________________________________________________*__________________________________________________________________________________|

2 inputs(s) for total of 0.01 etn

key image 00: 5bde436d6bd71c0149be0e72e5505aed46243c1b5ea0a5c118e0a56de6dc68a2 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: bb6ba66857aac135d0d5d13b8847f64e8f79c6e7ec07975a995ede5286b6cf09 00062157 1 6/8 2017-12-10 23:39:10 08:154:10:20:30
key image 01: 9019e00b3a2be4a9d8647208d427d31f3ff6ac95f2431093bea0706fc82d375c amount: 0.01
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c069509dd342fad4c92c3f3ab5468023531163270aba889b338785f7c713bc69 00062159 1 13/7 2017-12-10 23:41:28 08:154:10:18:12
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 6, "key_offsets": [ 53615 ], "k_image": "5bde436d6bd71c0149be0e72e5505aed46243c1b5ea0a5c118e0a56de6dc68a2" } }, { "key": { "amount": 8000, "key_offsets": [ 114223 ], "k_image": "9019e00b3a2be4a9d8647208d427d31f3ff6ac95f2431093bea0706fc82d375c" } } ], "vout": [ { "amount": 7000, "target": { "key": "4acf8f5a55bc0d857d91920deb9094bd8acd4338be270b2800888cb50213ef92" } }, { "amount": 200, "target": { "key": "dc63103f2f7a2da76f29a36313fa6bd39b991523daf0af2464078ca65babd56f" } }, { "amount": 800, "target": { "key": "f446876af852421f0b10cf977526cc1fcdf27bf7203f4f7f4c93c70c38611a18" } }, { "amount": 5, "target": { "key": "cf40ef6504ae14d6f7661788558a606463c3630c3616d4cd0d7aab4a1ae1b8c4" } } ], "extra": [ 1, 37, 53, 25, 104, 160, 253, 117, 80, 55, 206, 35, 225, 44, 111, 105, 86, 158, 56, 132, 27, 27, 254, 84, 147, 186, 57, 158, 131, 123, 85, 176, 82 ], "signatures": [ "04a078b82472b9f1062d1d748bf3366313f05169abaf67e5666a32774f4ab906420447e9faa5f51bfd5ed20bfd82b8a51b78da49a1d36c4b077689bfa1cf190b", "8e46be11ac67d27a69fb379bd3f21a1e62a1f814e63727bf4ada7a327126df0b0af836718d085860f05c4be9ff6d9d0bd3dbedb0dd44ae1eb8cabed985235f01"] }


Less details