Tx hash: adb200e3d9d5bde0d408c6801891310ccc67bb5feac2a292a203f366d0eb99a2

Tx prefix hash: dd6c3171303208a82bc9fde785c769c205278a21cd6a4b18740297dc571ebfba
Tx public key: f7f22d542da698eb714ce13e93e0a71bd67aab6d0a3a5c28e59504439d192205
Payment id: f626c08b67723286c1eb71f6eeacf170fc3e75fbe4c4c584a14868e70d2c8755
Payment id as ascii ([a-zA-Z0-9 /!]): gr2qpuHhU
Timestamp: 1512475067 Timestamp [UCT]: 2017-12-05 11:57:47 Age [y:d:h:m:s]: 08:149:03:40:36
Block: 54465 Fee: 0.000020 Tx size: 0.3389 kB
Tx version: 1 No of confirmations: 3931500 RingCT/type: no
Extra: 022100f626c08b67723286c1eb71f6eeacf170fc3e75fbe4c4c584a14868e70d2c875501f7f22d542da698eb714ce13e93e0a71bd67aab6d0a3a5c28e59504439d192205

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 6fdb3b20c268734c6d01ac943654d42cd91468c354bbc8728529eb30d27a661a 0.00 130541 of 1027483
01: 227071c60ee2d6c712e3f042c90cac7842163b7e98d60dc81d3a8772d826d8bf 0.00 1019321 of 7257418

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-05 10:30:41 till 2017-12-05 12:30:41; resolution: 0.000490 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|

2 inputs(s) for total of 0.00 etn

key image 00: 21d45ed8dacfe12b25a235c31d60106ae3f70a28a99efb605b23b10f413ac79a amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 807e57e8cf81f44a2a14b5ddcc11968b81cf3f2b5a818997db419320de8f7204 00054442 2 3/43 2017-12-05 11:30:41 08:149:04:07:42
key image 01: 07dd42b95efa295469cec93fc168602e8f7544e053a7d33be1f73aa68fc1ec2f amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: fc027088c6bb2afb0483584b09275f36a16f2b949d3402b86793107eb3d3d105 00054442 2 3/43 2017-12-05 11:30:41 08:149:04:07:42
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 1000, "key_offsets": [ 1018276 ], "k_image": "21d45ed8dacfe12b25a235c31d60106ae3f70a28a99efb605b23b10f413ac79a" } }, { "key": { "amount": 100, "key_offsets": [ 435136 ], "k_image": "07dd42b95efa295469cec93fc168602e8f7544e053a7d33be1f73aa68fc1ec2f" } } ], "vout": [ { "amount": 80, "target": { "key": "6fdb3b20c268734c6d01ac943654d42cd91468c354bbc8728529eb30d27a661a" } }, { "amount": 1000, "target": { "key": "227071c60ee2d6c712e3f042c90cac7842163b7e98d60dc81d3a8772d826d8bf" } } ], "extra": [ 2, 33, 0, 246, 38, 192, 139, 103, 114, 50, 134, 193, 235, 113, 246, 238, 172, 241, 112, 252, 62, 117, 251, 228, 196, 197, 132, 161, 72, 104, 231, 13, 44, 135, 85, 1, 247, 242, 45, 84, 45, 166, 152, 235, 113, 76, 225, 62, 147, 224, 167, 27, 214, 122, 171, 109, 10, 58, 92, 40, 229, 149, 4, 67, 157, 25, 34, 5 ], "signatures": [ "381c72e36f6ce7eaa76477dad9cc949d32cab744c278f44b8d77478a7d89d501d9e0f9818d069d1fd333a5aa6129130eb4709d992c3efc9565b7290154a9f102", "7edd36b7ba8083df4e29f6fbbde46f98c723700893bb1f9a50af851d9fb5a80df2a8897d3d4c70e5a80db9e6e65d82ecc7524cd1fa9c0b1d232368adc6207a04"] }


Less details