Tx hash: 5a832c87127d3438e3cea5da734a50f2b23f83c3d0c92dc0f288f7e92a1c51d1

Tx prefix hash: 6c16cfb04949c612e2df5235153415ac07887a86517c20bdebfc408d7dbc161b
Tx public key: 7a09ad85b1192c3547e4738c48f0bfa99fc10b0c0c935f08a7edd19c28c5c254
Timestamp: 1512985399 Timestamp [UCT]: 2017-12-11 09:43:19 Age [y:d:h:m:s]: 08:147:18:21:34
Block: 62735 Fee: 0.000001 Tx size: 0.3721 kB
Tx version: 1 No of confirmations: 3929546 RingCT/type: no
Extra: 017a09ad85b1192c3547e4738c48f0bfa99fc10b0c0c935f08a7edd19c28c5c254

4 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: fb69d910262327ad4374023847829bc9435839d7df8a8b703d23e78e29735640 0.00 1305287 of 7257418
01: eb3b6d3c492bc35692507506d3602b6859525edeb226daf79d565771b6dee1a4 0.00 261297 of 1252607
02: 86c2de11a95773c39186bbc56a2903255e2718d837bb0e62300adc4e661d4121 0.00 114697 of 862456
03: e3671c24d3b4b8163c96af8c709b41f8da0329b349bdac4c4998c95d3307653e 0.00 544134 of 2212696

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-11 07:20:51 till 2017-12-11 09:31:28; resolution: 0.000534 days)

  • |____________________________________________________________________________________________*_____________________________________________________________________________|
  • |______________________________________________________________________________*___________________________________________________________________________________________|

2 inputs(s) for total of 0.00 etn

key image 00: bf856215a566516c58526a87fe51a4ceacd632fa1729600b47fdd05a5d876a68 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 45449e03f9b7cc85f339d677a8294136f53455e570f59f6b336eed713b9b857e 00062675 1 1/8 2017-12-11 08:31:28 08:147:19:33:25
key image 01: b14ab65bf414e15f9c75b6b93c813b804dd38b3a6c116886582884d1b2301e37 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 9765907b66af3c99f2b30ab9d84c97bcb408d011fe0d83fa7b98365154dc6626 00062663 1 1/5 2017-12-11 08:20:51 08:147:19:44:02
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 9, "key_offsets": [ 172342 ], "k_image": "bf856215a566516c58526a87fe51a4ceacd632fa1729600b47fdd05a5d876a68" } }, { "key": { "amount": 2000, "key_offsets": [ 466934 ], "k_image": "b14ab65bf414e15f9c75b6b93c813b804dd38b3a6c116886582884d1b2301e37" } } ], "vout": [ { "amount": 1000, "target": { "key": "fb69d910262327ad4374023847829bc9435839d7df8a8b703d23e78e29735640" } }, { "amount": 900, "target": { "key": "eb3b6d3c492bc35692507506d3602b6859525edeb226daf79d565771b6dee1a4" } }, { "amount": 8, "target": { "key": "86c2de11a95773c39186bbc56a2903255e2718d837bb0e62300adc4e661d4121" } }, { "amount": 100, "target": { "key": "e3671c24d3b4b8163c96af8c709b41f8da0329b349bdac4c4998c95d3307653e" } } ], "extra": [ 1, 122, 9, 173, 133, 177, 25, 44, 53, 71, 228, 115, 140, 72, 240, 191, 169, 159, 193, 11, 12, 12, 147, 95, 8, 167, 237, 209, 156, 40, 197, 194, 84 ], "signatures": [ "838b7f586ab3ae7b321f816ee6d84e7f194cb9bab3c96b0dff226fdf988776099795351ea096cc2530ac44c3bf30b85ff3b27e9b036bd506fac818aba7f80609", "d1a39794bbb9367ca7fb0a676ca7173c434a3de014acc929e775279e80588d0848a6f58dadc04530211f284ee43a0b4c996123249f084e35b835b21d3d231a0e"] }


Less details