Tx hash: 5aae00d88e1bec17b1c7c4ad5db5e96a696f9457f849a751ee75bafcbfa400fb

Tx prefix hash: 78d3a940ac6b58d1be21e251e3b024178d8f5a6644f81507bfdf6b20d96927fb
Tx public key: d07b3559fb80b87ddb63f0550e8aaed1368e23fdafb154bf09dbe73955feb485
Payment id: 22d81d6f5bdb92eadacae6a04d734d0d1397d12dac3c47fb204e5c3647fcb187
Payment id as ascii ([a-zA-Z0-9 /!]): oMsMGN6G
Timestamp: 1513251807 Timestamp [UCT]: 2017-12-14 11:43:27 Age [y:d:h:m:s]: 08:142:10:21:21
Block: 66870 Fee: 0.000001 Tx size: 0.3369 kB
Tx version: 1 No of confirmations: 3922263 RingCT/type: no
Extra: 02210022d81d6f5bdb92eadacae6a04d734d0d1397d12dac3c47fb204e5c3647fcb18701d07b3559fb80b87ddb63f0550e8aaed1368e23fdafb154bf09dbe73955feb485

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: ef11df42cf003111184bff8c83863965c7a444fe153afe26007758a5529b1861 0.00 139425 of 824195
01: 5cb6f3392fd9e8d87ad91d1908e1f6655cb3d5aeca155a530c2f55b70447e374 0.00 53975 of 619305

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-14 10:08:51 till 2017-12-14 12:12:55; resolution: 0.000507 days)

  • |__________________________________________________________________________________*_______________________________________________________________________________________|
  • |________________________________________________________________________________________*_________________________________________________________________________________|

2 inputs(s) for total of 0.00 etn

key image 00: 294bfdc0883ced04ab592788cd509cc88b9d4a8c91fb8799bc279b575042766b amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 56ad81b8c5008532ef22254b601726da3ee38f8c5b29e721301653486e40b1fb 00066853 1 3/8 2017-12-14 11:08:51 08:142:10:55:57
key image 01: 632a78efd0f6e836de02bafb492c5375041f57e36579556f73ff5190a5e5cc69 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4127ba5c5bced9abab21fac203586107c05b7b745bb31ef3428ee54725e4cf85 00066854 1 4/7 2017-12-14 11:12:55 08:142:10:51:53
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 30, "key_offsets": [ 139195 ], "k_image": "294bfdc0883ced04ab592788cd509cc88b9d4a8c91fb8799bc279b575042766b" } }, { "key": { "amount": 5, "key_offsets": [ 59180 ], "k_image": "632a78efd0f6e836de02bafb492c5375041f57e36579556f73ff5190a5e5cc69" } } ], "vout": [ { "amount": 30, "target": { "key": "ef11df42cf003111184bff8c83863965c7a444fe153afe26007758a5529b1861" } }, { "amount": 4, "target": { "key": "5cb6f3392fd9e8d87ad91d1908e1f6655cb3d5aeca155a530c2f55b70447e374" } } ], "extra": [ 2, 33, 0, 34, 216, 29, 111, 91, 219, 146, 234, 218, 202, 230, 160, 77, 115, 77, 13, 19, 151, 209, 45, 172, 60, 71, 251, 32, 78, 92, 54, 71, 252, 177, 135, 1, 208, 123, 53, 89, 251, 128, 184, 125, 219, 99, 240, 85, 14, 138, 174, 209, 54, 142, 35, 253, 175, 177, 84, 191, 9, 219, 231, 57, 85, 254, 180, 133 ], "signatures": [ "b4643ab0e06464f534ed492229aad37e1d7fc677814263a1893cf283607d2709c33ca3269189ac1d3f0b9a740ee943fe73e2fbbaf1a806cf146bf80d36121d0c", "69d74c83a51b6830b41fc7d6bd5d791c4a5b262f4724ff50945cf0717018890bcb7f215efe05b550230049bad76ca58183b6ce2fa4e9fdaa52545963f3bc9e0d"] }


Less details