Tx hash: 912d9c1b1997a31557f7b23f4a23363a3bbd577c80a9d31cd81a87e443be193b

Tx prefix hash: b2dccf4a120421839cd22db035b2ba7dc6905fa62e9d900f5e3909b08b70f43b
Tx public key: 7a763975300dce3987140d1f2aa827e622c097a9d8dadcb8d32701475c2ebc1e
Timestamp: 1527270464 Timestamp [UCT]: 2018-05-25 17:47:44 Age [y:d:h:m:s]: 07:345:04:58:12
Block: 300993 Fee: 0.000002 Tx size: 0.4053 kB
Tx version: 1 No of confirmations: 3688175 RingCT/type: no
Extra: 017a763975300dce3987140d1f2aa827e622c097a9d8dadcb8d32701475c2ebc1e

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: e6ff4afdc70d29d5e2bf208dd04178e62b61613d7cccce5d21b113939ac70815 0.00 6986954 of 7257418
01: f6cca0fcf631100306dbaab3a36be4c4b04aeaf9b6aeb3271398ecc823ea24c3 0.00 902955 of 948726

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-05-24 23:10:32 till 2018-05-25 01:10:32; resolution: 0.000490 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|

3 inputs(s) for total of 0.00 etn

key image 00: 7798665959fe2e285b5dc1a1366f3ea8da18ab096f38d66618de8a7085ef02df amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 405db350fabc878f63bf944127767902ebc2e833447e7bf9f5f0766f43fc519b 00299945 1 8/94 2018-05-25 00:10:32 07:345:22:35:24
key image 01: a74c29ccbd0caa3458f9275053bd242e81eed9d45cea69b595130cf766958b6a amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 710443a3dd7f0e7e5c1d553f8616b823118f2e704ffe3b77df9b55427c7bbb0f 00299945 1 8/94 2018-05-25 00:10:32 07:345:22:35:24
key image 02: 6b658116c5fb9b38a908ed56f6b7e95a37cfe55507c0f0376d2849f2681c120d amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 50d92b8cb2db2f9b68431b76a0d51097192d210d1fa3e845382d72af050b2fca 00299945 1 8/94 2018-05-25 00:10:32 07:345:22:35:24
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 2, "key_offsets": [ 593302 ], "k_image": "7798665959fe2e285b5dc1a1366f3ea8da18ab096f38d66618de8a7085ef02df" } }, { "key": { "amount": 20, "key_offsets": [ 890166 ], "k_image": "a74c29ccbd0caa3458f9275053bd242e81eed9d45cea69b595130cf766958b6a" } }, { "key": { "amount": 1000, "key_offsets": [ 6917999 ], "k_image": "6b658116c5fb9b38a908ed56f6b7e95a37cfe55507c0f0376d2849f2681c120d" } } ], "vout": [ { "amount": 1000, "target": { "key": "e6ff4afdc70d29d5e2bf208dd04178e62b61613d7cccce5d21b113939ac70815" } }, { "amount": 20, "target": { "key": "f6cca0fcf631100306dbaab3a36be4c4b04aeaf9b6aeb3271398ecc823ea24c3" } } ], "extra": [ 1, 122, 118, 57, 117, 48, 13, 206, 57, 135, 20, 13, 31, 42, 168, 39, 230, 34, 192, 151, 169, 216, 218, 220, 184, 211, 39, 1, 71, 92, 46, 188, 30 ], "signatures": [ "e805a091e178703376af36cbf74d642b0a524af2f8598375fbcc22b85aecfc0e35104fc4c0b3e002e3282eca7aa5963d185b3864702b5cfbb529f4f60696b306", "a935bbab860e90444be0fc73ff3458fb3d3ea612bc2e7f6b6460b449df45ac0433de12f14175995bcfc8d8b10ae33ccffe9aa33e63e3ce747efcc0b31c0ef40b", "73de7a1e5cf1ab826d0f62cd6c7eee67a56526d53d3aa6c30c30b6343bd2b90136288d8917ffa47e3afb231d1ac3c1fddf514d20c10e1b4f3f971b4c77628601"] }


Less details