Tx hash: a903c63bc89c41ec90b62e6c161a3e9794d06e4b21edd2220fa38c093575be02

Tx prefix hash: ff08e5457b1e8dfdb9cf78a444e925330267bf3265901b6016ea7d0bdfb86adc
Tx public key: 8ef5df942e0ea4f677f74adf8f5b5d89bdf3d77523e4f1f888aed857dc031ac3
Payment id: af26ca48f45cad4413ddb1a356afcc1b72325e4bce6f22a18348a8ca4e153c3f
Payment id as ascii ([a-zA-Z0-9 /!]): HDVr2KoHN
Timestamp: 1513260734 Timestamp [UCT]: 2017-12-14 14:12:14 Age [y:d:h:m:s]: 08:139:13:47:41
Block: 66970 Fee: 0.000020 Tx size: 0.3389 kB
Tx version: 1 No of confirmations: 3918327 RingCT/type: no
Extra: 022100af26ca48f45cad4413ddb1a356afcc1b72325e4bce6f22a18348a8ca4e153c3f018ef5df942e0ea4f677f74adf8f5b5d89bdf3d77523e4f1f888aed857dc031ac3

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: ee4c833ec48df1cb8290a12e5cf192edfbdc4151116f02cdbb67608be6b2ba63 0.00 137383 of 722888
01: 94634194ad7d66a5588b5306e27fb07c31e2a935fa0c9b17bc6b60ee80e6d5f1 0.00 529575 of 1640330

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-13 22:17:34 till 2017-12-14 14:43:33; resolution: 0.004028 days)

  • |___________*______________________________________________________________________________________________________________________________________________________________|
  • |_______________________________________________________________________________________________________________________________________________________________*__________|

2 inputs(s) for total of 0.00 etn

key image 00: af75d65c72a91253a8bba673fae923cb330204d61fce7fecced81a3c3e3e6570 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 499d79ed656b5dcce3341a0d876aa27cd62c18017612e35921d21311c1f28de1 00066303 1 5/3 2017-12-13 23:17:34 08:140:04:42:21
key image 01: c1325042c4cf1ddcfbcbb9626db24c1057a66f504efd80c3e465689e68cb459f amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: b865507a48fd52381edfc949da42a9802dca4a0d76328c2cdd541cd19c9c0ac8 00066952 1 2/27 2017-12-14 13:43:33 08:139:14:16:22
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 80, "key_offsets": [ 205760 ], "k_image": "af75d65c72a91253a8bba673fae923cb330204d61fce7fecced81a3c3e3e6570" } }, { "key": { "amount": 2000, "key_offsets": [ 529113 ], "k_image": "c1325042c4cf1ddcfbcbb9626db24c1057a66f504efd80c3e465689e68cb459f" } } ], "vout": [ { "amount": 60, "target": { "key": "ee4c833ec48df1cb8290a12e5cf192edfbdc4151116f02cdbb67608be6b2ba63" } }, { "amount": 2000, "target": { "key": "94634194ad7d66a5588b5306e27fb07c31e2a935fa0c9b17bc6b60ee80e6d5f1" } } ], "extra": [ 2, 33, 0, 175, 38, 202, 72, 244, 92, 173, 68, 19, 221, 177, 163, 86, 175, 204, 27, 114, 50, 94, 75, 206, 111, 34, 161, 131, 72, 168, 202, 78, 21, 60, 63, 1, 142, 245, 223, 148, 46, 14, 164, 246, 119, 247, 74, 223, 143, 91, 93, 137, 189, 243, 215, 117, 35, 228, 241, 248, 136, 174, 216, 87, 220, 3, 26, 195 ], "signatures": [ "162fb69fd4160ef5d3b67d37656061987c84c83630a539af3c7fe6328e2a6902362df5ff940cbf4e5f0a0fde7c8e8008fa595d7d456e0b9f5f5b7350b3351f0d", "d1aea78fde7df6b17edae1672012b34018cf6662abf29de0935e0ff9e3ccec0012eac84aba1673677649d001dbec026df538028dba058548a975200c38430205"] }


Less details