Tx hash: 6bab2f2334054a90f88a7dbd6fd1df5ddb0bc2ed819dff5da8bb54c4abb12c31

Tx prefix hash: aed59a208ce352ccf8b4a947d57e5f3bcd59782d68b3a366d34fe5136501bacd
Tx public key: 53ff74ec6c66be181f0cd636558697ef1798e93d8364186d654a9aa5e69de0f9
Timestamp: 1527536760 Timestamp [UCT]: 2018-05-28 19:46:00 Age [y:d:h:m:s]: 07:349:15:06:47
Block: 305442 Fee: 0.000001 Tx size: 0.4053 kB
Tx version: 1 No of confirmations: 3694190 RingCT/type: no
Extra: 0153ff74ec6c66be181f0cd636558697ef1798e93d8364186d654a9aa5e69de0f9

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: ae12e2dc091156f4e2194596f470e8a40af16fc50463bbdaf90aa3bda1bc0cb6 0.00 7183491 of 7257418
01: f89a813918ddae73c0306e4c02ce3c4c05819cf357394ecaf029434a50ce8126 0.00 936987 of 948726

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-05-27 02:41:44 till 2018-05-27 04:41:44; resolution: 0.000490 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|

3 inputs(s) for total of 0.00 etn

key image 00: ea5b2fbcdf2f2dfbb3df2fd5d4bf843a1c91731c8ca2c3c18393d59486931b1f amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0159ec12fffb52607ddf7cbbd109f677bb43631db0acf803935271f43d601a77 00303020 1 5/127 2018-05-27 03:41:44 07:351:07:11:03
key image 01: abd2750501fe1a96ba6c26a5c77e160e8c10466572f569f9eb0ff5a3495b188e amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 68f4c51ddef6b2834bebe1b0c6ea08a9a8df582f59bfe88596928d7c3e21b5ee 00303020 1 5/127 2018-05-27 03:41:44 07:351:07:11:03
key image 02: 851306bdc023a23615c1cc5433741a3aaec104db4c6b055f5d204bd9d84f4db5 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4b35c975f23a46282a4579a81e28c91ea48da6ba305cca4a1a332f71f0ff7e1b 00303020 1 5/127 2018-05-27 03:41:44 07:351:07:11:03
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 20, "key_offsets": [ 920601 ], "k_image": "ea5b2fbcdf2f2dfbb3df2fd5d4bf843a1c91731c8ca2c3c18393d59486931b1f" } }, { "key": { "amount": 1, "key_offsets": [ 419352 ], "k_image": "abd2750501fe1a96ba6c26a5c77e160e8c10466572f569f9eb0ff5a3495b188e" } }, { "key": { "amount": 1000, "key_offsets": [ 7094764 ], "k_image": "851306bdc023a23615c1cc5433741a3aaec104db4c6b055f5d204bd9d84f4db5" } } ], "vout": [ { "amount": 1000, "target": { "key": "ae12e2dc091156f4e2194596f470e8a40af16fc50463bbdaf90aa3bda1bc0cb6" } }, { "amount": 20, "target": { "key": "f89a813918ddae73c0306e4c02ce3c4c05819cf357394ecaf029434a50ce8126" } } ], "extra": [ 1, 83, 255, 116, 236, 108, 102, 190, 24, 31, 12, 214, 54, 85, 134, 151, 239, 23, 152, 233, 61, 131, 100, 24, 109, 101, 74, 154, 165, 230, 157, 224, 249 ], "signatures": [ "95e5fcd4857786e7e75c01dad9daa52f4aa44c10e556429718bbd21e4efeb90acffa2ce4f88995bf21bb506fbed210f5c110d7ba5c1f041f6e71c23c12d24107", "779d09f31d557d82f704cb69724f37761e28182af34f7e8d99857236df2ae10e11d0b0fb79cea1620e4584e1cddca52aefe9a3e8d7b645cce5dd6a838839110c", "fe3a3a5c8634dfb768ef0d8e452a57e97c808e0617053529b143d6f325664c0c4dca9959f39aa978ff3b74891f5d6e6cc1c933f3e66f1237e8291d0bda7e0304"] }


Less details