Tx hash: 90a3aa312ea228afa07b0e22ae57e7fd3cc99cc6f7974bba26a0dc9b14186690

Tx prefix hash: a257d37e0ee436bba688246718c2d96bdcbec3750f90c9188e4e592868f1b9f0
Tx public key: 5f388c18e81e1ad2368d70fbf291749ec0e98c46a353d39f8a569d19e34ebf65
Timestamp: 1527132439 Timestamp [UCT]: 2018-05-24 03:27:19 Age [y:d:h:m:s]: 07:352:06:05:42
Block: 298680 Fee: 0.000001 Tx size: 0.4053 kB
Tx version: 1 No of confirmations: 3698091 RingCT/type: no
Extra: 015f388c18e81e1ad2368d70fbf291749ec0e98c46a353d39f8a569d19e34ebf65

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: fbfffc08f5c4fa3de3ebe04942a1d9b4cf1e663a112b9da54156de76dafa7f11 0.00 700217 of 730584
01: de6b0a399f6473abc5d0666a52f46ef6de49df7ef459c6f41c79987a1e07a82f 0.00 6863796 of 7257418

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-05-23 22:23:01 till 2018-05-24 00:23:01; resolution: 0.000490 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|

3 inputs(s) for total of 0.00 etn

key image 00: ef4485b0bf48b35b24c7891899d829c2dd39b289ce36c976f7d4220f5c074dc3 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 28b62663b264df1fcabb6d4a94650b629caff402d15c00567c3cfc65fd53d0fc 00298451 1 4/154 2018-05-23 23:23:01 07:352:10:10:00
key image 01: 76fd33d0f87b28858e2264394b2cb384003740f2fe1f9335eeb165e74c8317a2 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 756e4619fd247989ff4219073f1881aa4defaa73409664d6fc02ad4deaa140f8 00298451 1 4/154 2018-05-23 23:23:01 07:352:10:10:00
key image 02: d86105575a591b0b610475e27dcafe4ca834e974f5a4c6b026252f79eb80f2ee amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 91eea159762f445d84452beaf46fca4f13c443521cf5050957cff664fc312352 00298451 1 4/154 2018-05-23 23:23:01 07:352:10:10:00
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 50, "key_offsets": [ 699644 ], "k_image": "ef4485b0bf48b35b24c7891899d829c2dd39b289ce36c976f7d4220f5c074dc3" } }, { "key": { "amount": 1, "key_offsets": [ 392338 ], "k_image": "76fd33d0f87b28858e2264394b2cb384003740f2fe1f9335eeb165e74c8317a2" } }, { "key": { "amount": 1000, "key_offsets": [ 6854633 ], "k_image": "d86105575a591b0b610475e27dcafe4ca834e974f5a4c6b026252f79eb80f2ee" } } ], "vout": [ { "amount": 50, "target": { "key": "fbfffc08f5c4fa3de3ebe04942a1d9b4cf1e663a112b9da54156de76dafa7f11" } }, { "amount": 1000, "target": { "key": "de6b0a399f6473abc5d0666a52f46ef6de49df7ef459c6f41c79987a1e07a82f" } } ], "extra": [ 1, 95, 56, 140, 24, 232, 30, 26, 210, 54, 141, 112, 251, 242, 145, 116, 158, 192, 233, 140, 70, 163, 83, 211, 159, 138, 86, 157, 25, 227, 78, 191, 101 ], "signatures": [ "2ccabb86a9cf06c660f4d7cb6149b683c8db87c1780013fd8297d6377c43530476dc2df642d6ee451812df5f56832c57235ca13cd619bf698aa5a3c53cd23b07", "ade6c372a2d738ee4b4386a7f2db8caf7a27d8c27eef75c0ef25a6d97919740dcf1d39d102a7ae10560b76f2d6fc4b3d3ce8df828e77c20af4c0b570129af309", "6f0dda81ee89854e18199ccaf31e67d87d9de7e9349879a50a5b026e8acc7a05a861e85b0ce9bceb0c8e3c9ba34b28bc9c0bbe67133d6fcfcea461fae69cd405"] }


Less details