Tx hash: 6d7116dfd30d854ec84eb3ede8aca1a801579e153b4d1547e5260830aff5bcd2

Tx prefix hash: 835539db05b58e6eb8fe347ff673ee1094bf98970f9a563d582a1ef90485aa79
Tx public key: e9ebb4c76aaf86d46ad1beb48af981f8fec4a7d14599ce55c4f372f5383c1e92
Timestamp: 1512625105 Timestamp [UCT]: 2017-12-07 05:38:25 Age [y:d:h:m:s]: 08:148:11:29:14
Block: 56412 Fee: 0.000001 Tx size: 0.4043 kB
Tx version: 1 No of confirmations: 3931042 RingCT/type: no
Extra: 01e9ebb4c76aaf86d46ad1beb48af981f8fec4a7d14599ce55c4f372f5383c1e92

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 6ef3e54ef5c2b5098e47c6cdc0656a1e526c35a0a0131c0e03b7e256e4935886 0.00 317674 of 1331469
01: 2ee943099a90209946a9593677ef73ed484050e4342f068ed2859571514fccf1 0.00 38128 of 714591

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-07 04:16:24 till 2017-12-07 06:20:07; resolution: 0.000505 days)

  • |________________________________________________________________________________________*_________________________________________________________________________________|
  • |___________________________________________________________________________________*______________________________________________________________________________________|
  • |__________________________________________________________________________________*_______________________________________________________________________________________|

3 inputs(s) for total of 0.00 etn

key image 00: 326b3961fd21fe5892c11f7bb1e4d93049d9b3c49e9e7cc991f21952af84b30d amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 59a2c0ae54d30c9f390f0da6b2cb75e4acc0f72f569c2c7fda3cde41597c34e1 00056397 1 5/6 2017-12-07 05:20:07 08:148:11:47:32
key image 01: 3a2491baa5a18f4ffe3c5c443acd47c8f5ebb44d91f3d9658fb925e99688a1ba amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 89615f2f0074cbb483b62377ecc4df328f04c36e236dd7c52b8f5218fc5b0a91 00056395 1 1/5 2017-12-07 05:17:06 08:148:11:50:33
key image 02: 59c9728cd44602dd362e4ddd04421362f5364eae0cbd6f51a12dc7c8f6cd301c amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: e2c1cbb1b20a6b6a4cdf83ad5fea8d293a62b641b55754a519b5264eaba3ebc9 00056394 1 4/6 2017-12-07 05:16:24 08:148:11:51:15
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 400, "key_offsets": [ 307753 ], "k_image": "326b3961fd21fe5892c11f7bb1e4d93049d9b3c49e9e7cc991f21952af84b30d" } }, { "key": { "amount": 100, "key_offsets": [ 453278 ], "k_image": "3a2491baa5a18f4ffe3c5c443acd47c8f5ebb44d91f3d9658fb925e99688a1ba" } }, { "key": { "amount": 7, "key_offsets": [ 91694 ], "k_image": "59c9728cd44602dd362e4ddd04421362f5364eae0cbd6f51a12dc7c8f6cd301c" } } ], "vout": [ { "amount": 500, "target": { "key": "6ef3e54ef5c2b5098e47c6cdc0656a1e526c35a0a0131c0e03b7e256e4935886" } }, { "amount": 6, "target": { "key": "2ee943099a90209946a9593677ef73ed484050e4342f068ed2859571514fccf1" } } ], "extra": [ 1, 233, 235, 180, 199, 106, 175, 134, 212, 106, 209, 190, 180, 138, 249, 129, 248, 254, 196, 167, 209, 69, 153, 206, 85, 196, 243, 114, 245, 56, 60, 30, 146 ], "signatures": [ "a44ca3a1a2bee8d29f87ccdf4faf51785d858a5319db21efec8f277cadcc6609b2e3c2423b36cd81e56a55375620ebaecf1863ed2a6fc5c8928cbfbdd9b0650a", "9e6055be8350fc1327dee8052007f8bb8ba2c8eeddce5160cdd048904236e600664b70d4f4c11a692335a77335a356489e6ed59f1506c9189b3e68779b7c040e", "6e799dc6e3bfcd810a2ac9443805ee59cdfd6cf7240548b25b0b07e1a7a39d0b8b99d8ff0ac5ba8aa844acb52e603033923d0627d7b38c7db300c24fedbf4706"] }


Less details