Tx hash: a0fa20bf199141e6e241c565f008d271c78a90cb48f3b8e676a268dad7ae2540

Tx prefix hash: d14aa82ab24b30c7c2f18ee490e4f11f51cfe414a0bf4525c40b29025c2f9533
Tx public key: 4a68d9540d3bff1d32a6dc5b5a5d6b003278d7625af0b7a6022d9bf84ab0b705
Timestamp: 1512337654 Timestamp [UCT]: 2017-12-03 21:47:34 Age [y:d:h:m:s]: 08:151:05:14:05
Block: 52216 Fee: 0.000001 Tx size: 0.3730 kB
Tx version: 1 No of confirmations: 3934410 RingCT/type: no
Extra: 014a68d9540d3bff1d32a6dc5b5a5d6b003278d7625af0b7a6022d9bf84ab0b705

4 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 64f200698386a81e0ac97fd60230deb9dc6ddc4ca498d4f1c56e9f03997b5d37 0.00 292676 of 1331469
01: 0d4734db304285abca191fa8d8ff26df5fd21ed5cd4887a55280e156a4cd09a5 0.00 292677 of 1331469
02: 1f7273eb80793f148b3ef16596ed75b37872c27a864adf578a2e8c34c61f5c28 0.00 32947 of 714591
03: e020d6328962850fa2fdb09e6205d24bb4b00e518c108872eeac58cf97614b8f 0.00 953258 of 7257418

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-03 20:04:24 till 2017-12-03 22:12:32; resolution: 0.000523 days)

  • |__________________________________________________________________________________________*_______________________________________________________________________________|
  • |________________________________________________________________________________*_________________________________________________________________________________________|

2 inputs(s) for total of 0.00 etn

key image 00: b22c4dd0c987aaed4728b1da02590068ae57f241b9d3edd4fa7d5a89b2f6e6ed amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 991d2bbb2c249e70ea30777bb7481cd86bb74fdbb6edc80bc36f5408b7bb992b 00052179 1 4/5 2017-12-03 21:12:32 08:151:05:49:07
key image 01: aabbbc6c38747db2da3fc588fe0b9c32e2dc8e58c0736292000f94446820ce06 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: ed128cb515899202b4b1c551bfdeea80d7075041ba6d9fa76186b5f0e51238f7 00052169 1 1/5 2017-12-03 21:04:24 08:151:05:57:15
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 7, "key_offsets": [ 78841 ], "k_image": "b22c4dd0c987aaed4728b1da02590068ae57f241b9d3edd4fa7d5a89b2f6e6ed" } }, { "key": { "amount": 2000, "key_offsets": [ 337385 ], "k_image": "aabbbc6c38747db2da3fc588fe0b9c32e2dc8e58c0736292000f94446820ce06" } } ], "vout": [ { "amount": 500, "target": { "key": "64f200698386a81e0ac97fd60230deb9dc6ddc4ca498d4f1c56e9f03997b5d37" } }, { "amount": 500, "target": { "key": "0d4734db304285abca191fa8d8ff26df5fd21ed5cd4887a55280e156a4cd09a5" } }, { "amount": 6, "target": { "key": "1f7273eb80793f148b3ef16596ed75b37872c27a864adf578a2e8c34c61f5c28" } }, { "amount": 1000, "target": { "key": "e020d6328962850fa2fdb09e6205d24bb4b00e518c108872eeac58cf97614b8f" } } ], "extra": [ 1, 74, 104, 217, 84, 13, 59, 255, 29, 50, 166, 220, 91, 90, 93, 107, 0, 50, 120, 215, 98, 90, 240, 183, 166, 2, 45, 155, 248, 74, 176, 183, 5 ], "signatures": [ "fcf3d448ed3ca1b5dbc9e3e91c8f667c9c7253fe3b667e7abda034e14f2a1f0af4e61cd7990d70b1e11dbbb13efb16390f385a452148a7c565c16f6c10247702", "43bd3c54112b6938cf71c3a1e941eb1fca916e54c3353349856c59029cb73a0201c027e53d78167c94ebef095c795f22327d6fd843795f8e814290be8199250c"] }


Less details