Tx hash: 7aba973ede4b0383c18d9a8903101a449076b00ac64667e67e78cfd8bc572d2c

Tx prefix hash: ea3ac54b02386010148b4dc17646f349732c431da87df1a023e3a99150011425
Tx public key: a8d9ab0a476e6166a6b8eba70b6b170f37aac33a36fb9e5125565797371cc034
Timestamp: 1513192042 Timestamp [UCT]: 2017-12-13 19:07:22 Age [y:d:h:m:s]: 08:139:02:58:41
Block: 66115 Fee: 0.000002 Tx size: 0.4043 kB
Tx version: 1 No of confirmations: 3917442 RingCT/type: no
Extra: 01a8d9ab0a476e6166a6b8eba70b6b170f37aac33a36fb9e5125565797371cc034

2 output(s) for total of 0.01 ETNX

stealth address amount amount idx
00: 812bbfc4ff9eb9ec4f8b2fbb6f797bd26d9d03ffded207122a791ffd9d39e41b 0.00 299111 of 1393312
01: 92903078c215876715d3811aa18bc0c3e85e98e5b8f0b32614b458739fb6fd2b 0.01 135379 of 508840

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-13 11:33:55 till 2017-12-13 14:16:05; resolution: 0.000662 days)

  • |___________________________________________________________________________________________________________*______________________________________________________________|
  • |_______________________________________________________________*__________________________________________________________________________________________________________|
  • |_________________________________________________________________________*________________________________________________________________________________________________|

3 inputs(s) for total of 0.01 etn

key image 00: 70375b2e845dd17f1b524068beb1fd8863f6f261126390af0de5e5a38263d62e amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 7200e59cd58fada7dd13a92ccb2d9bfbf2e41fb1d67bb5e78532a13bd55af8a9 00065825 1 9/3 2017-12-13 13:16:05 08:139:08:49:58
key image 01: 0cee660874cac0a89d30da684747bc503ae1290210f5003929a3f3c730f38318 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 61997de4dfbfa89cb15099789b19cca770b76d7397a56bafcf0e4d365e62e600 00065789 1 1/7 2017-12-13 12:33:55 08:139:09:32:08
key image 02: 744879f470e296315238e6ebb18ae6fff7b90930bf8117f69767d7defe93a7a0 amount: 0.01
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 33317ba613b5de82dfe8e0ca99980385efe6145f71deb554681940a80ccec2b2 00065800 1 1/7 2017-12-13 12:43:49 08:139:09:22:14
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 2, "key_offsets": [ 43754 ], "k_image": "70375b2e845dd17f1b524068beb1fd8863f6f261126390af0de5e5a38263d62e" } }, { "key": { "amount": 90, "key_offsets": [ 291363 ], "k_image": "0cee660874cac0a89d30da684747bc503ae1290210f5003929a3f3c730f38318" } }, { "key": { "amount": 7000, "key_offsets": [ 133315 ], "k_image": "744879f470e296315238e6ebb18ae6fff7b90930bf8117f69767d7defe93a7a0" } } ], "vout": [ { "amount": 90, "target": { "key": "812bbfc4ff9eb9ec4f8b2fbb6f797bd26d9d03ffded207122a791ffd9d39e41b" } }, { "amount": 7000, "target": { "key": "92903078c215876715d3811aa18bc0c3e85e98e5b8f0b32614b458739fb6fd2b" } } ], "extra": [ 1, 168, 217, 171, 10, 71, 110, 97, 102, 166, 184, 235, 167, 11, 107, 23, 15, 55, 170, 195, 58, 54, 251, 158, 81, 37, 86, 87, 151, 55, 28, 192, 52 ], "signatures": [ "35ee1da30c41a906cfe8ee5f5e489105fa252fd6bc2b3c7f9273da5fd510540955df2ab7f53576603291737e5326625648942d64d9aae77406680d5e3b5de801", "d1335fabb31941d5241b2c6cfea860d1175a057a369cd7d89717dd042eaa0b0e177f8d9817540bf42f6376d4b2f26ffa1da9f1931a222cefe7d84101c8628300", "65957e9c82dba7469fd372ed827a1dccd0fe60dde19c3bffbfa6ef23db4f4a0f8b495be33e839097cbf4291f972855276821b9c2e7c1565f18473d034e697204"] }


Less details