Tx hash: b16e15d60ba06427f2d2df0d523302348029f01066e773ba480b025e50aab993

Tx prefix hash: aef3b4bbfe258951f39f1412772e03f4cd01bf5f972fd87c9eae0e38a3510151
Tx public key: 6a2d00156f547001075e6c599cee014f2772d73edcd447653a29384a301c43d8
Payment id: 49082658f3be87f0435cd01c6ba8df6adb478f86d6f4f578b11b33a87a24e7ec
Payment id as ascii ([a-zA-Z0-9 /!]): IXCkjGx3z
Timestamp: 1509918128 Timestamp [UCT]: 2017-11-05 21:42:08 Age [y:d:h:m:s]: 08:181:04:55:06
Block: 11893 Fee: 0.000020 Tx size: 0.3379 kB
Tx version: 1 No of confirmations: 3977499 RingCT/type: no
Extra: 02210049082658f3be87f0435cd01c6ba8df6adb478f86d6f4f578b11b33a87a24e7ec016a2d00156f547001075e6c599cee014f2772d73edcd447653a29384a301c43d8

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 959d646d1d256495dde8cad14565f82d32a33f6d6ae4fab35c37003b7cfed702 0.00 39196 of 968489
01: e5a5af8318cb8f40dcdc44f1ecc0117c6f059685de8c5601f6b784b4d3f5db1b 0.00 21588 of 722888

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-11-04 18:35:11 till 2017-11-05 01:53:32; resolution: 0.001791 days)

  • |________________________*_________________________________________________________________________________________________________________________________________________|
  • |__________________________________________________________________________________________________________________________________________________*_______________________|

2 inputs(s) for total of 0.00 etn

key image 00: 278321e8207dff896a2e51334454ef1d4e9ab3573ac51040de8c5da325ccfa7a amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: bca43ac96e685cfbb3c19ff8f7c5da5257a6f553efacd1127f2f58300da74179 00010374 1 8/3 2017-11-04 19:35:11 08:182:07:02:03
key image 01: 8cdfd59a65f985512fe2909209573621ac1995120e9dda0f59ab60e3e60b65c4 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a0acd81da3c7a82e32ea9cda5830595e310c62672c17291bfb6a8443d287d9be 00010654 4 4/316 2017-11-05 00:53:32 08:182:01:43:42
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 80, "key_offsets": [ 16057 ], "k_image": "278321e8207dff896a2e51334454ef1d4e9ab3573ac51040de8c5da325ccfa7a" } }, { "key": { "amount": 800, "key_offsets": [ 33870 ], "k_image": "8cdfd59a65f985512fe2909209573621ac1995120e9dda0f59ab60e3e60b65c4" } } ], "vout": [ { "amount": 800, "target": { "key": "959d646d1d256495dde8cad14565f82d32a33f6d6ae4fab35c37003b7cfed702" } }, { "amount": 60, "target": { "key": "e5a5af8318cb8f40dcdc44f1ecc0117c6f059685de8c5601f6b784b4d3f5db1b" } } ], "extra": [ 2, 33, 0, 73, 8, 38, 88, 243, 190, 135, 240, 67, 92, 208, 28, 107, 168, 223, 106, 219, 71, 143, 134, 214, 244, 245, 120, 177, 27, 51, 168, 122, 36, 231, 236, 1, 106, 45, 0, 21, 111, 84, 112, 1, 7, 94, 108, 89, 156, 238, 1, 79, 39, 114, 215, 62, 220, 212, 71, 101, 58, 41, 56, 74, 48, 28, 67, 216 ], "signatures": [ "7adafc22ea465ce98766c28c20d68ee014e2ff730aebf20d036c99c6076e130e4612e642abe240c0d7136aa8897f3cd6ad04b3cba1f1fd2fbebace4d0eaac70e", "273ac428c9a041d600ce61e48ae41e6a9bf182c71d70d2e8eb03d40f65ad460090741aca7b5022ddf5d57222334d700014ed48f2b6ba747e492fc333fe13600c"] }


Less details