Tx hash: 6f43392a6be572c1d6be8ac04b5877943c78d39363cd9f3c2a0ec2aa9490c6da

Tx prefix hash: 27a40c04eb69cade1a80a394969170ec7360c380dd657f948b7ef055b0e9a4f2
Tx public key: b27899b9a4bf197aeac17823d672f1ee305902d2ecda173d6e725dd0f095d7b8
Timestamp: 1526997289 Timestamp [UCT]: 2018-05-22 13:54:49 Age [y:d:h:m:s]: 07:356:19:35:40
Block: 296453 Fee: 0.000002 Tx size: 0.4072 kB
Tx version: 1 No of confirmations: 3704478 RingCT/type: no
Extra: 01b27899b9a4bf197aeac17823d672f1ee305902d2ecda173d6e725dd0f095d7b8

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 6fa44db4411c9d32643e431cdd732a8c0335771eca389343da1a4ba6bcea1f9b 0.00 6732498 of 7257418
01: 9771848ab4eea6d2a3d53acb4be9bce3869914bbcf0b00a39c0c732799c12867 0.00 1061043 of 1089390

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-05-21 02:33:00 till 2018-05-21 04:33:00; resolution: 0.000490 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|

3 inputs(s) for total of 0.00 etn

key image 00: 2b1af26c860255ce3fabe3be36bf84874e0f323441ec0577a54c047b90ce6ef2 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: fef5ee49ba03ff717b4fb21f27108a8e964022d381d71e747711e8e9914c4a35 00294361 1 6/195 2018-05-21 03:33:00 07:358:05:57:29
key image 01: abb3e328f202e702fa9f9f9fd945b4b09eb5aa73bd6403a30b6319ef77454f9f amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5962667bf88eb8f466686b7dc79a3fdee2079ed025b0746757838e21303615ad 00294361 1 6/195 2018-05-21 03:33:00 07:358:05:57:29
key image 02: d249e9bb455af90e6a41c1186059b6780dcf612570f68ff0b352b28a6a6f05bd amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 24a20be909573696085631ea3bb6c9110290a3f1e463bc68c3b7136c18fd8027 00294361 1 6/195 2018-05-21 03:33:00 07:358:05:57:29
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 600, "key_offsets": [ 1055039 ], "k_image": "2b1af26c860255ce3fabe3be36bf84874e0f323441ec0577a54c047b90ce6ef2" } }, { "key": { "amount": 2, "key_offsets": [ 557737 ], "k_image": "abb3e328f202e702fa9f9f9fd945b4b09eb5aa73bd6403a30b6319ef77454f9f" } }, { "key": { "amount": 1000, "key_offsets": [ 6627062 ], "k_image": "d249e9bb455af90e6a41c1186059b6780dcf612570f68ff0b352b28a6a6f05bd" } } ], "vout": [ { "amount": 1000, "target": { "key": "6fa44db4411c9d32643e431cdd732a8c0335771eca389343da1a4ba6bcea1f9b" } }, { "amount": 600, "target": { "key": "9771848ab4eea6d2a3d53acb4be9bce3869914bbcf0b00a39c0c732799c12867" } } ], "extra": [ 1, 178, 120, 153, 185, 164, 191, 25, 122, 234, 193, 120, 35, 214, 114, 241, 238, 48, 89, 2, 210, 236, 218, 23, 61, 110, 114, 93, 208, 240, 149, 215, 184 ], "signatures": [ "1f0c9c62c392e58b98159f93347d66166f17de9e0a95ae6734e059054ad44c08a27c881cc5f3c53a136d0853f1d461ef6967d3cb01f91cec5ebdf87261c53800", "dec92980afb210cc4133af36b28ea307cc2e86a02378fe49885fff1e6a282a0dae2033de7beae4a06ea54c7ec464a8b2b17870e171286ec40f6783fa6c5db809", "198938200d0aa7b52f4f1319ba5c38e5a5d2c2d11d1959cf5f40ed835eede5056382056fe2e1c92704366e46f660493327d7ebff8304aef89f6010111f0cfe01"] }


Less details