Tx hash: 967a5272a88f7cc66c40d76f606f98a5bc957b0e9c5df5feda659d9dd91433a0

Tx prefix hash: f39993b427b89c94aba97af535660a0d7234226ca33cae0667d0ca78a0bbef13
Tx public key: 056f4b5624ae55adbb10a4f26f2caa53cc5c74c1567ddfb8ac951a423a7f4b25
Timestamp: 1513051626 Timestamp [UCT]: 2017-12-12 04:07:06 Age [y:d:h:m:s]: 08:146:13:27:57
Block: 63902 Fee: 0.000001 Tx size: 0.4053 kB
Tx version: 1 No of confirmations: 3927771 RingCT/type: no
Extra: 01056f4b5624ae55adbb10a4f26f2caa53cc5c74c1567ddfb8ac951a423a7f4b25

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 34a60d3b1b3517d0b4344e6606242f719bc8a8070a220b541f0d62c74349fe76 0.00 263194 of 968489
01: 7d92367caeb2e05ccfe546715f401bf6276a5d4a5c0b625520debb2d904eb72b 0.00 45598 of 619305

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-11 22:42:19 till 2017-12-12 00:59:04; resolution: 0.000559 days)

  • |_______________________________________________________________________________________________*__________________________________________________________________________|
  • |___________________________________________________________________________*______________________________________________________________________________________________|
  • |________________________________________________________________________________________*_________________________________________________________________________________|

3 inputs(s) for total of 0.00 etn

key image 00: 35d6357e8a2fbff668f9ee174bf6b8149d414b8dbb6fea216e7d40b3bae2093e amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: f6b764387606dc4e4ccdc91a858a36d298d3f3034eec55b454432c815dac42e6 00063633 1 4/6 2017-12-11 23:59:04 08:146:17:35:59
key image 01: 06c65db96e4035c226258e1fca30385aea3489fee5660229334c51cf270f7394 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6128f1ae9f06ece88a05311dc15265e1b20f8661db3c32fadfb3011824ca57c8 00063615 1 8/5 2017-12-11 23:42:19 08:146:17:52:44
key image 02: f5477b11e76b6e2ef7974c3b445f3319764e01047fd551c97799e3c270754066 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 50abab4d9016ec598292ab90a44b81641c36ecb572b39b5a7a9d89b440ee5912 00063623 1 3/4 2017-12-11 23:53:05 08:146:17:41:58
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 400, "key_offsets": [ 385783 ], "k_image": "35d6357e8a2fbff668f9ee174bf6b8149d414b8dbb6fea216e7d40b3bae2093e" } }, { "key": { "amount": 400, "key_offsets": [ 385676 ], "k_image": "06c65db96e4035c226258e1fca30385aea3489fee5660229334c51cf270f7394" } }, { "key": { "amount": 5, "key_offsets": [ 49727 ], "k_image": "f5477b11e76b6e2ef7974c3b445f3319764e01047fd551c97799e3c270754066" } } ], "vout": [ { "amount": 800, "target": { "key": "34a60d3b1b3517d0b4344e6606242f719bc8a8070a220b541f0d62c74349fe76" } }, { "amount": 4, "target": { "key": "7d92367caeb2e05ccfe546715f401bf6276a5d4a5c0b625520debb2d904eb72b" } } ], "extra": [ 1, 5, 111, 75, 86, 36, 174, 85, 173, 187, 16, 164, 242, 111, 44, 170, 83, 204, 92, 116, 193, 86, 125, 223, 184, 172, 149, 26, 66, 58, 127, 75, 37 ], "signatures": [ "fde8dac1ca024c806e9a9b2ae4f747e180b3f14620b26bfd66524b307d3c570be36e7d341e333e3689e7768a59ac51cd63fd57bc9393dd49b1fe291bf217c907", "ce96513c066c5124b98f962ebcc6864b1e71340cc85faaa36af8629efd01f802824e529e8d3c52011e118ae85b94d6ed55c7276fb0e570772512ea4ac42fcd07", "8d92c40c42e55cd8843f5a4da40df8978662dbdc18705505910ce07931377f02b896ebbec2ab0218c1a89c9bbc9d6cb283fbc9539fc79825c428ecf717954c07"] }


Less details