Tx hash: ad53388678a796962fc4db1bc2d0148ad45950083f31d0d641a5e55926fb64a0

Tx prefix hash: f71f9ad58670c2276451677bd68a1dba817d2bb0bdaf256deeaed5951628e0a8
Tx public key: b241efef4d7a9d0ab0b10d74453a96a64744a8abded7fa9082bdd74a8a4dda80
Payment id: 34c2be2133d40d4fd5dbbd822ae9f67a6eb82195f7bbc562f1522ad1ac45630a
Payment id as ascii ([a-zA-Z0-9 /!]): 43OznbREc
Timestamp: 1513445468 Timestamp [UCT]: 2017-12-16 17:31:08 Age [y:d:h:m:s]: 08:136:19:22:46
Block: 70247 Fee: 0.000020 Tx size: 0.3389 kB
Tx version: 1 No of confirmations: 3914176 RingCT/type: no
Extra: 02210034c2be2133d40d4fd5dbbd822ae9f67a6eb82195f7bbc562f1522ad1ac45630a01b241efef4d7a9d0ab0b10d74453a96a64744a8abded7fa9082bdd74a8a4dda80

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: a659608422cf284d602e9576e781c5fa8c17cf373f9037fe2cd7a0f63fd2c3ea 0.00 315549 of 968489
01: a6afb22959a6d1b5b88692eb50520541bf04d407e4318bfb74efb673a35cef45 0.00 147111 of 722888

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-16 07:03:42 till 2017-12-16 09:03:42; resolution: 0.000490 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|

2 inputs(s) for total of 0.00 etn

key image 00: 86742a938c60ed953df630d236c2e4028d4abb4c16466de257196582baf87e1d amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 4f6628030ff313c2518f0dba7b24d38cb4ff2cd1f2f3d3ce7c28e2195586df7d 00069724 1 8/3 2017-12-16 08:03:42 08:137:04:50:12
key image 01: f7ae310d798f7c808daa121bc67823472529a19cede2238f68e17d3112ade510 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a158a1df92c916c7e99feda9f10032710428c69fd54ec78fbbbaede102d2aef7 00069724 1 8/3 2017-12-16 08:03:42 08:137:04:50:12
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 800, "key_offsets": [ 311334 ], "k_image": "86742a938c60ed953df630d236c2e4028d4abb4c16466de257196582baf87e1d" } }, { "key": { "amount": 80, "key_offsets": [ 227991 ], "k_image": "f7ae310d798f7c808daa121bc67823472529a19cede2238f68e17d3112ade510" } } ], "vout": [ { "amount": 800, "target": { "key": "a659608422cf284d602e9576e781c5fa8c17cf373f9037fe2cd7a0f63fd2c3ea" } }, { "amount": 60, "target": { "key": "a6afb22959a6d1b5b88692eb50520541bf04d407e4318bfb74efb673a35cef45" } } ], "extra": [ 2, 33, 0, 52, 194, 190, 33, 51, 212, 13, 79, 213, 219, 189, 130, 42, 233, 246, 122, 110, 184, 33, 149, 247, 187, 197, 98, 241, 82, 42, 209, 172, 69, 99, 10, 1, 178, 65, 239, 239, 77, 122, 157, 10, 176, 177, 13, 116, 69, 58, 150, 166, 71, 68, 168, 171, 222, 215, 250, 144, 130, 189, 215, 74, 138, 77, 218, 128 ], "signatures": [ "14c125f7b92979f1c223a91366e3c4c6cba5b97b886f1512fe829dc79eb87801dba23eac835640e8fb57ca2c645c6e841c15afd10673656e7002796cae17780e", "545e8ccd8d4d8e678c06d6a0fa94310b296705f73cc3451ff06a6f296b47c1034830444c2dd96b8d78bd935df293145fa9d5bcea141a0c38359ab9a77b202e05"] }


Less details