Tx hash: 934ba03100d74cd76c83b1ed716da828e72ee0944e162b8233b81fda1eeaac03

Tx prefix hash: 279db4de9717925aefda37e68fc9713aded76c6cb31a773653d30dd02bcee484
Tx public key: fb3686c0551f062ea6d070d1e3fa527ed82a2980eb53c7447ac444e3febdcf8f
Timestamp: 1512648825 Timestamp [UCT]: 2017-12-07 12:13:45 Age [y:d:h:m:s]: 08:147:21:24:55
Block: 56769 Fee: 0.000001 Tx size: 0.3730 kB
Tx version: 1 No of confirmations: 3930246 RingCT/type: no
Extra: 01fb3686c0551f062ea6d070d1e3fa527ed82a2980eb53c7447ac444e3febdcf8f

4 output(s) for total of 0.01 ETNX

stealth address amount amount idx
00: a5f3980012ed97fff655afb9cc6119f096647a03fe0fa74ceb36689cec5d9483 0.00 323557 of 1331469
01: e07dafeba522696344d3ee3070c2db8a88e14997a692d714ec54e6c6ab0ae023 0.00 323558 of 1331469
02: b94008b764d3529060670d3bbb09789712f0aef99f5abc94b36e52b3849c39db 0.01 97470 of 548684
03: c4b4b8a23b1ac6555bb0059f03ac7aef90fc7e3203c6cd8194d20ba973800e50 0.00 84609 of 862456

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-07 10:45:35 till 2017-12-07 12:59:03; resolution: 0.000545 days)

  • |______________________________________________________________________________________________*___________________________________________________________________________|
  • |____________________________________________________________________________*_____________________________________________________________________________________________|

2 inputs(s) for total of 0.01 etn

key image 00: d547d31b6a49bda661663e26be3bada93f43dd017122fa9eade831bf24c38a1a amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5ba11dbbfa6ef96bac993eb6f14ac81ac4ca080adbe8d822e2a219681a8a6c91 00056758 1 1/3 2017-12-07 11:59:03 08:147:21:39:37
key image 01: 50be26fb5cd9f9a1b45ea99ee9be56030bc39d03afe59c2c0140846feb107879 amount: 0.01
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: fa93e67f78d7b5eee2db1eea900ea711a348624bb2efe0575e6985fd47680853 00056748 1 4/6 2017-12-07 11:45:35 08:147:21:53:05
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 9, "key_offsets": [ 97943 ], "k_image": "d547d31b6a49bda661663e26be3bada93f43dd017122fa9eade831bf24c38a1a" } }, { "key": { "amount": 7000, "key_offsets": [ 89424 ], "k_image": "50be26fb5cd9f9a1b45ea99ee9be56030bc39d03afe59c2c0140846feb107879" } } ], "vout": [ { "amount": 500, "target": { "key": "a5f3980012ed97fff655afb9cc6119f096647a03fe0fa74ceb36689cec5d9483" } }, { "amount": 500, "target": { "key": "e07dafeba522696344d3ee3070c2db8a88e14997a692d714ec54e6c6ab0ae023" } }, { "amount": 6000, "target": { "key": "b94008b764d3529060670d3bbb09789712f0aef99f5abc94b36e52b3849c39db" } }, { "amount": 8, "target": { "key": "c4b4b8a23b1ac6555bb0059f03ac7aef90fc7e3203c6cd8194d20ba973800e50" } } ], "extra": [ 1, 251, 54, 134, 192, 85, 31, 6, 46, 166, 208, 112, 209, 227, 250, 82, 126, 216, 42, 41, 128, 235, 83, 199, 68, 122, 196, 68, 227, 254, 189, 207, 143 ], "signatures": [ "2b5dec2a3a501c8a02cd1f2b121fe02fd7c1694a87bfeaca8aa7d98070f3d00b5e9824972584c426673b2af3d9db5ca7f567a98e51ef4d9ce470f0bb5a6fa40e", "f3a631b47f5d1ee27acadf3eefd23daca48a28f22304085c2ab5f1c316c8730d7212c9b2daba1b44d37804b078c253a98b4c4864d222cdccba9bc6cf9d159200"] }


Less details