Tx hash: 6397a7209e5616d1a389399244e66aec3b5ee559987f1f0c6044f24c943ff18c

Tx prefix hash: dfa83813736ddff76e3108604d3217a9c57673867d0e55faf9096d7c5f60c622
Tx public key: 16b4f8f7aab41aabdcdbb824971d40fd470d77404c3a5d4d2b5cdc83a3b85192
Timestamp: 1512657125 Timestamp [UCT]: 2017-12-07 14:32:05 Age [y:d:h:m:s]: 08:146:09:17:14
Block: 56944 Fee: 0.000001 Tx size: 0.3730 kB
Tx version: 1 No of confirmations: 3928109 RingCT/type: no
Extra: 0116b4f8f7aab41aabdcdbb824971d40fd470d77404c3a5d4d2b5cdc83a3b85192

4 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 8c6ca257e7e3f9d3ebe3d5de4847249c0488d3ba7909c71a51790c2c68c5a6be 0.00 100321 of 1204163
01: 02784ae5c90ad30e85a8089c822833676f63532c7c419ad34497b41ea4f33561 0.00 226478 of 1012165
02: 97086e4a837052a3f058b2dcddb319b52ab74e0bbb8b97830d0ef29db0eda1fb 0.00 260220 of 1089390
03: c480f8dbfafad91194c96e727cdad78829171b14eae1f8ead1e26f771d106c2f 0.00 192981 of 1393312

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-07 13:15:42 till 2017-12-07 15:17:46; resolution: 0.000499 days)

  • |______________________________________________________________________________________*___________________________________________________________________________________|
  • |____________________________________________________________________________________*_____________________________________________________________________________________|

2 inputs(s) for total of 0.00 etn

key image 00: e59304154c55200437c756b51becaf8189ec25192dc44fd9d4ea8e87bcbfdb2a amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a66dee999a8a2c974a67c1998f0ad7f8c800e2b53417e04c5db7d55516faefee 00056929 1 1/6 2017-12-07 14:17:46 08:146:09:31:33
key image 01: 12949924e20b796eeefe88a062539abac25419bf290392de1ebce245672956d3 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 87083d58867d71c45be0083732f33cb6392bf79b218a06b71811934069063da0 00056927 1 3/3 2017-12-07 14:15:42 08:146:09:33:37
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 700, "key_offsets": [ 226261 ], "k_image": "e59304154c55200437c756b51becaf8189ec25192dc44fd9d4ea8e87bcbfdb2a" } }, { "key": { "amount": 700, "key_offsets": [ 226229 ], "k_image": "12949924e20b796eeefe88a062539abac25419bf290392de1ebce245672956d3" } } ], "vout": [ { "amount": 9, "target": { "key": "8c6ca257e7e3f9d3ebe3d5de4847249c0488d3ba7909c71a51790c2c68c5a6be" } }, { "amount": 700, "target": { "key": "02784ae5c90ad30e85a8089c822833676f63532c7c419ad34497b41ea4f33561" } }, { "amount": 600, "target": { "key": "97086e4a837052a3f058b2dcddb319b52ab74e0bbb8b97830d0ef29db0eda1fb" } }, { "amount": 90, "target": { "key": "c480f8dbfafad91194c96e727cdad78829171b14eae1f8ead1e26f771d106c2f" } } ], "extra": [ 1, 22, 180, 248, 247, 170, 180, 26, 171, 220, 219, 184, 36, 151, 29, 64, 253, 71, 13, 119, 64, 76, 58, 93, 77, 43, 92, 220, 131, 163, 184, 81, 146 ], "signatures": [ "7320b6cb4c41d4e444118fa1a8c0d1643c39674c9d0f611e9aec61b3a2fa920448be952501f266835a796fe3829810162048ebadad9c6b6552c5f316ebe51008", "adca5106b541d3a54fc6cb49352f8c5b0da8bc1a9fac454705e7c1deb8eb1f068ee4ae2adce163efe94a0b9b9d0f8b7e2b640a8e0b003d291b3e3f34ac712e03"] }


Less details