Tx hash: 6edaeb76a0f3829d8a6f02073e22c3023f362949942ada16c951b053e3130c08

Tx prefix hash: c6bb5613ea2263af299e8d1659b413c7efaa7257aa503cdf9acc346d65d9d0f4
Tx public key: f970ec53260f0c96289afd9b781e9d9e9918ef166868d0106d7facce67de382a
Timestamp: 1527495595 Timestamp [UCT]: 2018-05-28 08:19:55 Age [y:d:h:m:s]: 07:342:17:18:50
Block: 304745 Fee: 0.000001 Tx size: 0.4072 kB
Tx version: 1 No of confirmations: 3684593 RingCT/type: no
Extra: 01f970ec53260f0c96289afd9b781e9d9e9918ef166868d0106d7facce67de382a

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 27a459bd29d1e8b77b8df327bdba7c8d5ff46644643604fbbc0b5ebd551d7936 0.00 1631229 of 1640330
01: 9e268c5b26b21a8cd9756a26db8ad5260b0c185750d41cc44da645f21321f0e5 0.00 1183245 of 1204163

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-05-21 12:36:40 till 2018-05-26 06:43:30; resolution: 0.027969 days)

  • |________________________________________________________________________________________________________________________________________________________________________*_|
  • |__*_______________________________________________________________________________________________________________________________________________________________________|
  • |________________________________________________________________________________________________________________________________________________________________________*_|

3 inputs(s) for total of 0.00 etn

key image 00: d09629dbcd9dbc2a6850ed810cb42f13cc17159331c8b2ad49a13973612ef704 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 13d6db1eeb57dd9c06c27a3d3f147287eadd59129c5918b4d920838357d1538a 00301678 1 2/140 2018-05-26 05:43:30 07:344:19:55:15
key image 01: 839ba3df17c07896534da24b634feef0c79294d6c2c26cccff8e2832b5c662ae amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f8cba344281fbd0b1df9f298503d2c85cb6d50ea4ee5df67128fa63e5882ba6c 00294945 1 1/200 2018-05-21 13:36:40 07:349:12:02:05
key image 02: 9fa1b9fc5c25ed40bc1e97b312b9afe208d80b91f7f02d35c0c0f65e6b18ba94 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 79065a657d80f47264284e73405f15dc9033efba2a2e609d432611997d422764 00301678 1 2/140 2018-05-26 05:43:30 07:344:19:55:15
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 1000, "key_offsets": [ 7031318 ], "k_image": "d09629dbcd9dbc2a6850ed810cb42f13cc17159331c8b2ad49a13973612ef704" } }, { "key": { "amount": 1000, "key_offsets": [ 6675773 ], "k_image": "839ba3df17c07896534da24b634feef0c79294d6c2c26cccff8e2832b5c662ae" } }, { "key": { "amount": 10, "key_offsets": [ 1419803 ], "k_image": "9fa1b9fc5c25ed40bc1e97b312b9afe208d80b91f7f02d35c0c0f65e6b18ba94" } } ], "vout": [ { "amount": 2000, "target": { "key": "27a459bd29d1e8b77b8df327bdba7c8d5ff46644643604fbbc0b5ebd551d7936" } }, { "amount": 9, "target": { "key": "9e268c5b26b21a8cd9756a26db8ad5260b0c185750d41cc44da645f21321f0e5" } } ], "extra": [ 1, 249, 112, 236, 83, 38, 15, 12, 150, 40, 154, 253, 155, 120, 30, 157, 158, 153, 24, 239, 22, 104, 104, 208, 16, 109, 127, 172, 206, 103, 222, 56, 42 ], "signatures": [ "a5bb238b77a4148c1e78677b93f121334896f944c0f957fb78742b917fc1da00014dba5a4dca2eb31f5b1ff8af2d3e366877557284cc856a7337fbdca12fd20d", "086a85572c23f4c637b4b306eb6362ea7be6de99f18efb605e20e47e4fcc590681fc3f4e7d4539952d58652fd20cc03e856015a73895681f23c79be88379cf04", "d2e2eb4fcd5ac4ad8fdf67d85a0adbfa36800aadfa2edb92b33547e041a9f00ae5637ca75ca6056089d4351850ec3b28506e32430ef9a9549a10547070c2d40d"] }


Less details