Tx hash: 80b922e7a3d03188d81fbbbbb444ce4224e3d93ce9eac874eda5f51f939facfa

Tx prefix hash: 866aa5aa27dba94e5736196d9e5a03b8068bb14e512289997292d05f4d5fa7ae
Tx public key: 535fcae8394757350a44f3ac0237303cda8d001a1c4726fdf65b73a7ec37ea82
Timestamp: 1513961282 Timestamp [UCT]: 2017-12-22 16:48:02 Age [y:d:h:m:s]: 08:133:01:30:56
Block: 78919 Fee: 0.000001 Tx size: 0.3730 kB
Tx version: 1 No of confirmations: 3908601 RingCT/type: no
Extra: 01535fcae8394757350a44f3ac0237303cda8d001a1c4726fdf65b73a7ec37ea82

4 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 299fb5e1e17bfe40da7eed326d9388b8ab92d7105ac722b815fe678a231cf3ad 0.00 539733 of 1331469
01: 6b876ca255f3a9a464c01071cbd991060636346cc962c6ed0000702fc9a4959c 0.00 433761 of 1393312
02: b583dbecf58977f30a2c331ec8d3fe2991efd4c821699c7f1066d2eff1644d7e 0.00 326580 of 1204163
03: ccd2e2e873ef42be96573b46e5a26d2fc40a7cf4b8d43e0762744aeb79cba725 0.00 448212 of 1089390

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-22 15:32:55 till 2017-12-22 17:34:18; resolution: 0.000496 days)

  • |______________________________________________________________________________________*___________________________________________________________________________________|
  • |____________________________________________________________________________________*_____________________________________________________________________________________|

2 inputs(s) for total of 0.00 etn

key image 00: 17e806c25e6560da9bfd1cdfd7941a933600fd271de3654259430409d1714595 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6ebbbcbada01f003e5b91914b86e88dc5de890392e3484e765692a8c9bff3bd2 00078905 1 1/6 2017-12-22 16:34:18 08:133:01:44:40
key image 01: 92bf83307ae26e5a474f49bc37aab5790a571927908de88314b7090bfb3d1c3e amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0bfacb99ba1a576e2df3fb60f2502e14bcdaeb38d2dcd1ff1c5d6fea93b4d77a 00078903 1 4/5 2017-12-22 16:32:55 08:133:01:46:03
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 300, "key_offsets": [ 636703 ], "k_image": "17e806c25e6560da9bfd1cdfd7941a933600fd271de3654259430409d1714595" } }, { "key": { "amount": 900, "key_offsets": [ 411534 ], "k_image": "92bf83307ae26e5a474f49bc37aab5790a571927908de88314b7090bfb3d1c3e" } } ], "vout": [ { "amount": 500, "target": { "key": "299fb5e1e17bfe40da7eed326d9388b8ab92d7105ac722b815fe678a231cf3ad" } }, { "amount": 90, "target": { "key": "6b876ca255f3a9a464c01071cbd991060636346cc962c6ed0000702fc9a4959c" } }, { "amount": 9, "target": { "key": "b583dbecf58977f30a2c331ec8d3fe2991efd4c821699c7f1066d2eff1644d7e" } }, { "amount": 600, "target": { "key": "ccd2e2e873ef42be96573b46e5a26d2fc40a7cf4b8d43e0762744aeb79cba725" } } ], "extra": [ 1, 83, 95, 202, 232, 57, 71, 87, 53, 10, 68, 243, 172, 2, 55, 48, 60, 218, 141, 0, 26, 28, 71, 38, 253, 246, 91, 115, 167, 236, 55, 234, 130 ], "signatures": [ "09029de869e5bcc8890613c0f362b3131e1e2e7c1777760590a0e48222398001583104152be6a63aea1b7898802d9aaed41506f60e2d3603acd09ba4d87bd903", "c5bf2be2123dc14390b7bb856b32407a15edb60b6bcf1e519ca9f28612e12603449c06a463c3963d779dcab22ae9919fd06125143b2b08919f978dad42371201"] }


Less details