Tx hash: 99d759ba42837dc47e85e9dbca4c14d546a3fb32439577614906d53b7412d94c

Tx prefix hash: 675db6392424bc9e2bd5b8d3d935cd32fac33f485d3a4988fb0f9677a00db175
Tx public key: d55399ce0f1cc17170a59bb9eefaf4912fdedde74fdc74a8d903d47fb6f22ce5
Timestamp: 1514077523 Timestamp [UCT]: 2017-12-24 01:05:23 Age [y:d:h:m:s]: 08:129:08:22:13
Block: 80892 Fee: 0.000001 Tx size: 0.3721 kB
Tx version: 1 No of confirmations: 3903333 RingCT/type: no
Extra: 01d55399ce0f1cc17170a59bb9eefaf4912fdedde74fdc74a8d903d47fb6f22ce5

4 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 80a8bf2ca14b5a641fb57098b1c6150ecb83ab08af098aa077a831c44033dcf2 0.00 386089 of 968489
01: f889a3dfa8ae90f8a08e771f486781f654fc37fcfe59d0b8324ab61991a0de2d 0.00 338749 of 1204163
02: 17278b5b7338ead14fe8773d8efb20fd7b89b4bf4b9e58fac63d86bffcc15c0d 0.00 949856 of 2003140
03: bedee3bfce99ba6ae7b8a7d7f520ca864197cba7619e22c0b02514b28dde60ff 0.00 191834 of 948726

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-23 23:30:53 till 2017-12-24 01:36:06; resolution: 0.000512 days)

  • |_________________________________________________________________________________*________________________________________________________________________________________|
  • |_________________________________________________________________________________________*________________________________________________________________________________|

2 inputs(s) for total of 0.00 etn

key image 00: 3ce843d51793ef16ee5f6b82e1d9e048461638ffc61668a43be7115a2d0bf676 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0e989d87fba1db0c4d7ee21d8b62c02e61ad13e9b32810278efee2cb7abdce43 00080861 1 3/4 2017-12-24 00:30:53 08:129:08:56:43
key image 01: 0d81a0f87a4998adb268340b31bcf4f0bc2cff8b97274cdd0c1c0de6c7d53687 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 10d99c9f7ca2a76f10d9d001bc011272be22dfef634e4876e1ff76f079f12a7c 00080866 1 2/4 2017-12-24 00:36:06 08:129:08:51:30
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 30, "key_offsets": [ 177162 ], "k_image": "3ce843d51793ef16ee5f6b82e1d9e048461638ffc61668a43be7115a2d0bf676" } }, { "key": { "amount": 1000, "key_offsets": [ 2015934 ], "k_image": "0d81a0f87a4998adb268340b31bcf4f0bc2cff8b97274cdd0c1c0de6c7d53687" } } ], "vout": [ { "amount": 800, "target": { "key": "80a8bf2ca14b5a641fb57098b1c6150ecb83ab08af098aa077a831c44033dcf2" } }, { "amount": 9, "target": { "key": "f889a3dfa8ae90f8a08e771f486781f654fc37fcfe59d0b8324ab61991a0de2d" } }, { "amount": 200, "target": { "key": "17278b5b7338ead14fe8773d8efb20fd7b89b4bf4b9e58fac63d86bffcc15c0d" } }, { "amount": 20, "target": { "key": "bedee3bfce99ba6ae7b8a7d7f520ca864197cba7619e22c0b02514b28dde60ff" } } ], "extra": [ 1, 213, 83, 153, 206, 15, 28, 193, 113, 112, 165, 155, 185, 238, 250, 244, 145, 47, 222, 221, 231, 79, 220, 116, 168, 217, 3, 212, 127, 182, 242, 44, 229 ], "signatures": [ "a4b307d3ef8581b5d1381fc275bef45abbb3028dcd4de1219f5c8c8d7c38d30532536dfdbfc61c0f659b8722760e9c05ae3d21cef403efdb6cc33a9063ef1c0a", "2db985259a8f178214e980ea056c30e1de009123b3f881cec7c50317882e2f0fbd465cc151a82f3102b9095e236213a17d70840e6fc3013d3e09d33706b7fa04"] }


Less details