Tx hash: 7fadfa53e944ec86829d1540a8505c9a161222f3751ec5bee20ab3bf95ecc9e0

Tx prefix hash: 6f0fe12aad5b4d2f685fdb86973b446bd61606c558231ae6e71b8687e6cff6e1
Tx public key: 0bd7fe2ca7b2d3f391cfbbaee56190fb12200f74070234f7c989140ca6160a4b
Timestamp: 1526196969 Timestamp [UCT]: 2018-05-13 07:36:09 Age [y:d:h:m:s]: 07:364:01:06:16
Block: 283097 Fee: 0.000001 Tx size: 0.3750 kB
Tx version: 1 No of confirmations: 3715012 RingCT/type: no
Extra: 010bd7fe2ca7b2d3f391cfbbaee56190fb12200f74070234f7c989140ca6160a4b

4 output(s) for total of 0.04 ETNX

stealth address amount amount idx
00: 82d494124dfcf4e8b6a9f189dd78124ebc79642ba119660ab89d4d4a38546ab3 0.02 514407 of 592088
01: e0d73ca260102c7622642aa2826db3bfd05b60c3dd2a0ef01f67ae79d4dcdf7b 0.00 872796 of 1027483
02: ba39ecc69d448d6041831a67901a16bb62a374741f114e085c195cac93270f65 0.02 514408 of 592088
03: 7defabdbc4ced873151b6bdce5774d06aede0bb10967db49f8bf57fc5e715324 0.00 1005216 of 1204163

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-05-13 02:34:49 till 2018-05-13 05:55:23; resolution: 0.000819 days)

  • |_______________________________________________________________________________________________________________________*__________________________________________________|
  • |___________________________________________________*______________________________________________________________________________________________________________________|

2 inputs(s) for total of 0.04 etn

key image 00: 855bc72b7e1190c2dd5ef893e19c9109c0b800789eccff24fcb3d4b256cdc261 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b982b21cdcd11aef0b97adb3833618d774aa00ba874737e6901e39dfaee3ee91 00282920 1 2/8 2018-05-13 04:55:23 07:364:03:47:02
key image 01: dd360720b04023101167156753102d06acb44090abe5a585bad2c1bdc830ec91 amount: 0.04
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 20e5e5a7a1c3e0ed264c15139afc52c54c4cff1ee5b6438d77144317f88a86b0 00282841 1 4/5 2018-05-13 03:34:49 07:364:05:07:36
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 90, "key_offsets": [ 1217361 ], "k_image": "855bc72b7e1190c2dd5ef893e19c9109c0b800789eccff24fcb3d4b256cdc261" } }, { "key": { "amount": 40000, "key_offsets": [ 323040 ], "k_image": "dd360720b04023101167156753102d06acb44090abe5a585bad2c1bdc830ec91" } } ], "vout": [ { "amount": 20000, "target": { "key": "82d494124dfcf4e8b6a9f189dd78124ebc79642ba119660ab89d4d4a38546ab3" } }, { "amount": 80, "target": { "key": "e0d73ca260102c7622642aa2826db3bfd05b60c3dd2a0ef01f67ae79d4dcdf7b" } }, { "amount": 20000, "target": { "key": "ba39ecc69d448d6041831a67901a16bb62a374741f114e085c195cac93270f65" } }, { "amount": 9, "target": { "key": "7defabdbc4ced873151b6bdce5774d06aede0bb10967db49f8bf57fc5e715324" } } ], "extra": [ 1, 11, 215, 254, 44, 167, 178, 211, 243, 145, 207, 187, 174, 229, 97, 144, 251, 18, 32, 15, 116, 7, 2, 52, 247, 201, 137, 20, 12, 166, 22, 10, 75 ], "signatures": [ "b0ccea49fe7c8187e57cb25fecc88ccb4b342373b55f5356864e6e11ddbded056cc966c587253e13c2d7dd8321377f6bc3d31e8543eb961cd346c5940e69de02", "6ef81df071fd2365d10b88552879a4bdecb22412854c59e05799f19f63161c0da7fe1b157d9f77333f176fd6f466631a6f404ca86e99ce3497ed19676ccf3d01"] }


Less details