Tx hash: 6830ce71a825c248b0e132fb3a9e8255bb01a81e39bf5ff41fa04e91cdb5bf65

Tx prefix hash: a340ce8729664f05170e2c1bda2b8ff19dafd0f8dee9be62789f91fc20b43286
Tx public key: 774056b9a8c01813b40f3a4f3846bd69633be81476cb46458cd50cf9cb25e998
Timestamp: 1526589752 Timestamp [UCT]: 2018-05-17 20:42:32 Age [y:d:h:m:s]: 07:354:07:36:06
Block: 289657 Fee: 0.000001 Tx size: 0.4365 kB
Tx version: 1 No of confirmations: 3701241 RingCT/type: no
Extra: 01774056b9a8c01813b40f3a4f3846bd69633be81476cb46458cd50cf9cb25e998

2 output(s) for total of 0.10 ETNX

stealth address amount amount idx
00: d46d4cd60d0450e6f5e5de9d097687d7ecae59f3b0ced24b7ddf3ab05e7271a0 0.10 355040 of 379867
01: 9eff66b4a56ec0208d44195d1cf7ab955f522c1b742d2b441237b25324115d6b 0.00 804223 of 1013510

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-03-06 18:28:22 till 2018-05-17 21:23:34; resolution: 0.424245 days)

  • |_________________________________________________________________________________________________________________________________________________________________________*|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 0.10 etn

key image 00: 27d962959b16872315338a7a4f9df5771a4f537ee7e220cd0052b943e540346b amount: 0.10
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a725eb35a1aef13457b8a6e6866543535ebc7cfd50d16bfe40096bc9ead76ad4 00289182 2 2/5 2018-05-17 13:43:42 07:354:14:34:56
- 01: ca6372d0fc109f99c5f06910fd0392e384a36be985232a60ebd05ce4d61bbe3b 00289638 2 3/4 2018-05-17 20:23:34 07:354:07:55:04
key image 01: 8d1e2279632a9336bfbe895098529eadc3fa367e2fe5786e9409852a1d1b92fd amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 8437cf4f4a89553944a538a6598812cfdfe488e7e71d2738a75f66df8e3f7c85 00185610 5 1/7 2018-03-06 19:28:22 08:061:08:50:16
- 01: bf7f6910dcd091812a599d295349d766a8a0cd39cce2db4dac9df9de5a79167a 00289612 2 4/5 2018-05-17 19:50:28 07:354:08:28:10
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 100000, "key_offsets": [ 342015, 12370 ], "k_image": "27d962959b16872315338a7a4f9df5771a4f537ee7e220cd0052b943e540346b" } }, { "key": { "amount": 6, "key_offsets": [ 317674, 296136 ], "k_image": "8d1e2279632a9336bfbe895098529eadc3fa367e2fe5786e9409852a1d1b92fd" } } ], "vout": [ { "amount": 100000, "target": { "key": "d46d4cd60d0450e6f5e5de9d097687d7ecae59f3b0ced24b7ddf3ab05e7271a0" } }, { "amount": 5, "target": { "key": "9eff66b4a56ec0208d44195d1cf7ab955f522c1b742d2b441237b25324115d6b" } } ], "extra": [ 1, 119, 64, 86, 185, 168, 192, 24, 19, 180, 15, 58, 79, 56, 70, 189, 105, 99, 59, 232, 20, 118, 203, 70, 69, 140, 213, 12, 249, 203, 37, 233, 152 ], "signatures": [ "ae27088c8ff7d272324d0c4a5b3747cc2ea132ef8d9c28cef45a3a045413990cd01c780759834b63107dddf85111ae0c58c7a737464fd9e6ef800f73794b750b70aef7254b86d83219e9510018326a913efb3f8b9d93af946aa50a2cb7d0c80cff524b093f403ae770cc3a67eea8b50c5b70110f444a508802a7fade04e6c80c", "169f0e7ab13985dfebf920220806f992916b2ccc1d6cef82bdd6da7848fcd60a4634e31fa17bd1bc6fa9809059f49c7e62484e7eec1a64c37312b14fae341608d58fa46fdff08f9f3d5c9eee715f141654e66a4ee8b94f55bdb6d9efa3b93d00bd5f0ea069fdcf4ea505239e0282b9772145ce62de0effb996ef74cba6a8ea02"] }


Less details