Tx hash: 6986a2c053987a43414c3cd98cd90939acd4ed6986155718f465bf6f46719c34

Tx prefix hash: bb2aa572cf0173c0263e24b319e0456cdad0664c096d091e0c7dd52c24067cc5
Tx public key: a0c9561a1139d36b0def7959298504660764fd0fb2d5bb1dccb56132fd7616f3
Timestamp: 1513453352 Timestamp [UCT]: 2017-12-16 19:42:32 Age [y:d:h:m:s]: 08:144:00:50:41
Block: 70359 Fee: 0.000001 Tx size: 0.3730 kB
Tx version: 1 No of confirmations: 3924284 RingCT/type: no
Extra: 01a0c9561a1139d36b0def7959298504660764fd0fb2d5bb1dccb56132fd7616f3

4 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 46d8e292ee77760ed697b29ab319823136a9a605845c93469b44809e59180e62 0.00 257943 of 1204163
01: 2024b843ac52e82f53c9e0df27dac808e096600c994b1dcfe1bab7b3f4ab3df6 0.00 452605 of 1279092
02: eab52d7d58f900240e06b238408799743bcd42652a4067db7677b607abdc0889 0.00 354790 of 1393312
03: 545d5a2bd1ef76e36203371d5fa4c8169cf2c1dccbc96b444c7391590030e3ad 0.00 342558 of 1012165

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-16 18:32:57 till 2017-12-16 20:32:57; resolution: 0.000490 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|

2 inputs(s) for total of 0.00 etn

key image 00: 0da3673eea0eab123ec43d6f692b72c682ce5b1f3e810b209f155e6f37d36f24 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b77e3c7db39d96e40c114ea4a737b995b77f4099bbc70c21f5a75637e5b2ce3c 00070347 1 15/7 2017-12-16 19:32:57 08:144:01:00:16
key image 01: 200bc1f90d5ac56b9132e161094c275cd2c9fd39e007945cc8218d0f029c4695 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 97d7437c9ca710d4a19f2926eb52bfae788b04e5c913c60fdee7da58b6ffa20c 00070347 1 4/6 2017-12-16 19:32:57 08:144:01:00:16
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 700, "key_offsets": [ 342446 ], "k_image": "0da3673eea0eab123ec43d6f692b72c682ce5b1f3e810b209f155e6f37d36f24" } }, { "key": { "amount": 500, "key_offsets": [ 467253 ], "k_image": "200bc1f90d5ac56b9132e161094c275cd2c9fd39e007945cc8218d0f029c4695" } } ], "vout": [ { "amount": 9, "target": { "key": "46d8e292ee77760ed697b29ab319823136a9a605845c93469b44809e59180e62" } }, { "amount": 400, "target": { "key": "2024b843ac52e82f53c9e0df27dac808e096600c994b1dcfe1bab7b3f4ab3df6" } }, { "amount": 90, "target": { "key": "eab52d7d58f900240e06b238408799743bcd42652a4067db7677b607abdc0889" } }, { "amount": 700, "target": { "key": "545d5a2bd1ef76e36203371d5fa4c8169cf2c1dccbc96b444c7391590030e3ad" } } ], "extra": [ 1, 160, 201, 86, 26, 17, 57, 211, 107, 13, 239, 121, 89, 41, 133, 4, 102, 7, 100, 253, 15, 178, 213, 187, 29, 204, 181, 97, 50, 253, 118, 22, 243 ], "signatures": [ "c3436bbd5806bd3ad30606e99e51a06843e805ca47fa0ed44b3b661e9f84640710f4e77c2dca762d519060f21823bb6a94aea2d1a7349754efc24804b6471c0a", "2b22203dd9e9871496db60a5083c13483184bd3a62ea8b4284fdd38d802622061246cdfd211b45c93fc4c77af042de8692e508ffa5f47cc71d114c6527eccc0e"] }


Less details