Tx hash: b21ecf468761b084f27103502975ffd9a19ed7d21ea0d17e12a785d560fd3f1e

Tx prefix hash: 2aac7e7c3a5d6d09faa8870a64af49b3699de5b28ed0159feeddd4bc638774b3
Tx public key: e71711369723c93f15d14e0313196d11de35a8b2e8fb3f60396f997e795830da
Timestamp: 1520877657 Timestamp [UCT]: 2018-03-12 18:00:57 Age [y:d:h:m:s]: 08:050:20:15:43
Block: 194172 Fee: 0.000001 Tx size: 0.4365 kB
Tx version: 1 No of confirmations: 3790335 RingCT/type: no
Extra: 01e71711369723c93f15d14e0313196d11de35a8b2e8fb3f60396f997e795830da

2 output(s) for total of 0.30 ETNX

stealth address amount amount idx
00: fac8d1cf0cd51c26e8e78a757e7456e977d54437264e8ee57faf1371d7f72ad5 0.00 465454 of 862456
01: d777329cc5011a661fbf8c3903d3c30b043b52b12163132c0005d9e2c11d62fe 0.30 126076 of 176951

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-03-05 13:00:09 till 2018-03-12 12:00:12; resolution: 0.040932 days)

  • |_______________________________________________________________________________________________________________________________________*_______________*__________________|
  • |__*_____________________________________________________________________________________________________________________________________________________________________*_|

2 inputs(s) for total of 0.30 etn

key image 00: 0442cf24e077cc99724399b37ccb828bbd4a96af851fda592627fe7b9751de1e amount: 0.30
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: da0ad69ec7d2758e81b392f7b1dfe334753e0c99a30fd6f0039bdbd7053a7e82 00191740 2 8/40 2018-03-11 01:41:16 08:052:12:35:24
- 01: 1c36723f30d300a3abe330949deb4545e63b29b0e979f2e2ebd8d26af054f875 00192667 1 2/7 2018-03-11 17:51:28 08:051:20:25:12
key image 01: 7789dc417abf05c8d46a437ba5b3fa847534dac79cd3f92fb10fd848c3669011 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 5342657c8f4774a71d1c436e355ee8345a54e2ab7ed7efd2596e83ee146da5c7 00183897 0 0/6 2018-03-05 14:00:09 08:058:00:16:31
- 01: 4edfb1589de1fb53e0fde02659e8153d05f46b94896c50a537ae507651261179 00193748 5 1/193 2018-03-12 11:00:12 08:051:03:16:28
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 300000, "key_offsets": [ 125000, 424 ], "k_image": "0442cf24e077cc99724399b37ccb828bbd4a96af851fda592627fe7b9751de1e" } }, { "key": { "amount": 9, "key_offsets": [ 687624, 20055 ], "k_image": "7789dc417abf05c8d46a437ba5b3fa847534dac79cd3f92fb10fd848c3669011" } } ], "vout": [ { "amount": 8, "target": { "key": "fac8d1cf0cd51c26e8e78a757e7456e977d54437264e8ee57faf1371d7f72ad5" } }, { "amount": 300000, "target": { "key": "d777329cc5011a661fbf8c3903d3c30b043b52b12163132c0005d9e2c11d62fe" } } ], "extra": [ 1, 231, 23, 17, 54, 151, 35, 201, 63, 21, 209, 78, 3, 19, 25, 109, 17, 222, 53, 168, 178, 232, 251, 63, 96, 57, 111, 153, 126, 121, 88, 48, 218 ], "signatures": [ "e3e69d7505267a24ad22fc15c61236a0aa86d7bafcade83fbbeccf5f79de0d0b3d40693dbdd289555182bcf08da9f5253ce130dc9ea97cdd54fe4879eb6c2b0447657cb33840bdab8b6a69e14f65dfadd1c5af55381a2d3e66541ef3fe9d5206fcac16b3d01496af496ed5cc3d8fc94eaa31f52eb39d1b82e72177ba4c85a309", "8978f3931b88b2373d12bf8a7af585ccd4d2760820f719c3dd356f7c877391043a9b2e085065df40185d277cd282a5654929516322f6892e58024a7c5afd1d0e6e67db3810e53b02fe0ffe999c1a32d64d095e0569714f6a9db83b4e9c6b1007f501cc2fe496a9db60d544f2aa289675fb3f7bb8bb1c88381d79b80f8b2ab104"] }


Less details