Tx hash: 51e50fd95fa76398ef566389f6d7c411cb4f401d0eff57841d199e8ee94ea059

Tx prefix hash: e8ba6f431f469fe4b53380a06378cae33f9f1b1ce88d63f5212f80ba7f7c6613
Tx public key: a9c8d43288e1fd41dcd5bf5968433d2d4f7ae759f03597381c4c0270d26e1958
Timestamp: 1515338591 Timestamp [UCT]: 2018-01-07 15:23:11 Age [y:d:h:m:s]: 08:118:17:51:58
Block: 101965 Fee: 0.000001 Tx size: 0.4082 kB
Tx version: 1 No of confirmations: 3887807 RingCT/type: no
Extra: 01a9c8d43288e1fd41dcd5bf5968433d2d4f7ae759f03597381c4c0270d26e1958

2 output(s) for total of 0.05 ETNX

stealth address amount amount idx
00: 0be780bb14274861a9d324d25af55f6c7e6fe5af6acb730b04bf2f9276a53169 0.05 243823 of 627138
01: f7bd699de6e74411715bb93330de6336b5a8e824e342ad66775b3d5026646f70 0.00 475203 of 968489

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-01-03 20:51:30 till 2018-01-07 09:59:57; resolution: 0.020868 days)

  • |__*_______________________________________________________________________________________________________________________________________________________________________|
  • |_____________________________________________*____________________________________________________________________________________________________________________________|
  • |________________________________________________________________________________________________________________________________________________________________________*_|

3 inputs(s) for total of 0.05 etn

key image 00: b12b789ea33e16177d81182d07e6b38d363753dfafa06736f78b0de60f9ebed5 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: db68b9e804b0461d647f88f5570ba05153b1db5656f08258c9b6b631524fe4bc 00096505 1 6/3 2018-01-03 21:51:30 08:122:11:23:39
key image 01: ac8546d3162b1c87480fc66426ad84d70f2e4543fea8bb5becb4591a26d5c407 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 26e283fa0f7b3aaf09fa912588ac295f5d9898d785192d6f2f9ffbce0c580e6c 00097724 2 13/93 2018-01-04 19:23:29 08:121:13:51:40
key image 02: 2ad9c92ffa01ea437edb8f1f2676266ebecd8e00fb99d22f14bc973b0650e988 amount: 0.05
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8e1f284a23caaf3919450542f21a8c3383670f98ef6df64452a251ea5aa99ae6 00101549 2 5/91 2018-01-07 08:59:57 08:119:00:15:12
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 800, "key_offsets": [ 453924 ], "k_image": "b12b789ea33e16177d81182d07e6b38d363753dfafa06736f78b0de60f9ebed5" } }, { "key": { "amount": 1, "key_offsets": [ 43946 ], "k_image": "ac8546d3162b1c87480fc66426ad84d70f2e4543fea8bb5becb4591a26d5c407" } }, { "key": { "amount": 50000, "key_offsets": [ 242406 ], "k_image": "2ad9c92ffa01ea437edb8f1f2676266ebecd8e00fb99d22f14bc973b0650e988" } } ], "vout": [ { "amount": 50000, "target": { "key": "0be780bb14274861a9d324d25af55f6c7e6fe5af6acb730b04bf2f9276a53169" } }, { "amount": 800, "target": { "key": "f7bd699de6e74411715bb93330de6336b5a8e824e342ad66775b3d5026646f70" } } ], "extra": [ 1, 169, 200, 212, 50, 136, 225, 253, 65, 220, 213, 191, 89, 104, 67, 61, 45, 79, 122, 231, 89, 240, 53, 151, 56, 28, 76, 2, 112, 210, 110, 25, 88 ], "signatures": [ "21c7c998f32364e23837fa0bfe186f37a736c797e8882a8dd4728fc550d855065ae1aa236303edfcbfbbe8f8cb80b1f3983ad1e9e249d89e005c65e4b5272509", "1e610a36a15ba64eac1c6bb43a226b6059fb5e21b5c7a9eb324bedf03de12804c8fd326857ce8243f23a1eef6cc30fd7b017409558e8b96193405e90e8865c05", "b42451a9527211c1be425301ebcd930745be914a46edaa1e83bdc1a56366eb0b90f55197998fc7ba5a8c068ebce392e3e802ce64b8292196301525281ffda306"] }


Less details