Tx hash: a04b85b93e47c13de135492538c2b1ba5c14c84e9f33b95df8fb5d947db71e50

Tx prefix hash: 355af1c8c68c133c384a47d5880bdddb6bdc7f09ec0415b6064c4efbde553d90
Tx public key: 066bb262709b30e4bfae52088b53a79a79d48d0b09de0cf7086da49f149045bb
Timestamp: 1523417856 Timestamp [UCT]: 2018-04-11 03:37:36 Age [y:d:h:m:s]: 08:029:06:06:29
Block: 236190 Fee: 0.000002 Tx size: 0.4326 kB
Tx version: 1 No of confirmations: 3759217 RingCT/type: no
Extra: 01066bb262709b30e4bfae52088b53a79a79d48d0b09de0cf7086da49f149045bb

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: aee9cada1588800269dae21c006a00a06125a507edeafbda842bce90773a8f13 0.00 534699 of 764406
01: 370193c0218307635b9465bf00614f36a2b3df711c6ed932e3b193360e185aa4 0.00 924561 of 1488031

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-01-22 15:09:26 till 2018-04-09 05:36:33; resolution: 0.450601 days)

  • |___________________________________________________________________________________________________________________________________________________________*______*_______|
  • |_*_______________________________________________________________________________________________________________________________________________________________________*|

2 inputs(s) for total of 0.00 etn

key image 00: f6695487c1caa8db6e357d501fc816fa7b5f62bc733286f5f7922da84edacc8c amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: d27a616b1a65cbc68d95fe55203b659932cdf63106f33d5cc4cbe0875eef5ff0 00224161 5 2/2 2018-04-02 19:58:15 08:037:13:45:50
- 01: 99037c2461aad8b6bdcafabfc273c42649f4414d1de76a3a2215967d2a549714 00228662 5 3/118 2018-04-05 22:11:52 08:034:11:32:13
key image 01: 556f57d96489586995c7e6627df23cc5ef2b8d76cfd82bf54704fd48e859c33b amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 3dcc1110b24a4a0f53f7344fe3b10dd2b40f692515af40e43354490aff5d5cfa 00123640 5 2/4 2018-01-22 16:09:26 08:107:17:34:39
- 01: e30b3618cf911eb2f6e5ab9203ef844e8f0e90c9d89ed853f7643c4371405747 00233437 5 2/3 2018-04-09 04:36:33 08:031:05:07:32
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 2, "key_offsets": [ 365221, 9117 ], "k_image": "f6695487c1caa8db6e357d501fc816fa7b5f62bc733286f5f7922da84edacc8c" } }, { "key": { "amount": 80, "key_offsets": [ 414270, 333073 ], "k_image": "556f57d96489586995c7e6627df23cc5ef2b8d76cfd82bf54704fd48e859c33b" } } ], "vout": [ { "amount": 70, "target": { "key": "aee9cada1588800269dae21c006a00a06125a507edeafbda842bce90773a8f13" } }, { "amount": 10, "target": { "key": "370193c0218307635b9465bf00614f36a2b3df711c6ed932e3b193360e185aa4" } } ], "extra": [ 1, 6, 107, 178, 98, 112, 155, 48, 228, 191, 174, 82, 8, 139, 83, 167, 154, 121, 212, 141, 11, 9, 222, 12, 247, 8, 109, 164, 159, 20, 144, 69, 187 ], "signatures": [ "68b1a7c539a4d976aad0cddc11730650efc25b8b8c45b36bd3bf373dbf9c520348ccbea2fddb2f73e168843eb92d506730085c93708d5f84d3da6f3a86c74b09e29bf97cb6410d3b520227fab92e1dea40632304518b99f4534dcce3f2b91a00fe379424527d2cad646e5c9574466f562018e0a9fde62ba0b173aa92ebaec606", "868387520033c59aa5e31269d2373ad60e3d6891a9535d2a7d6065bccd2cf90e687ff2eda78cd82fc487f975955d5276a9c6c3b13f9f9377c857e5d50414320f806ff4ce168e7d22cd38329af6509d8c164e5f1589de82a653de93994fc8e507184368ac30359659cd3dd05432af7566deba8e2c27692c84a1307c94f517e00f"] }


Less details