Tx hash: b2fba4d110f175a4391f27992eac49b54cbd650ab45a7bc82808a366fc762d04

Tx prefix hash: 7be035108d3a727e06231fe6589b79bc6784259708091e9a90fcd6ee5a4cf70c
Tx public key: aa729ac2014d2f23e827e4357dcb4bed56e35f74e9eb2b2782c4bf7d98f47b18
Timestamp: 1512252521 Timestamp [UCT]: 2017-12-02 22:08:41 Age [y:d:h:m:s]: 08:155:02:16:32
Block: 50748 Fee: 0.000001 Tx size: 0.4053 kB
Tx version: 1 No of confirmations: 3939914 RingCT/type: no
Extra: 01aa729ac2014d2f23e827e4357dcb4bed56e35f74e9eb2b2782c4bf7d98f47b18

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: ea50a22b4153f99022978e102af93fd1a9c6d0e07956f622c42436b922aa992a 0.00 68150 of 862456
01: 02ed8ba4a25aa686cc4976b1b874f82ee5029b70176f0dd55268e82192cfc9ac 0.00 226049 of 1089390

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2017-12-02 20:55:22 till 2017-12-02 22:55:22; resolution: 0.000490 days)

  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|
  • |_____________________________________________________________________________________*____________________________________________________________________________________|

3 inputs(s) for total of 0.00 etn

key image 00: 2f761eb555f0b72c3063c08439c054bdd3a20d3b5e2039d488433411b83b435e amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6b338e17b1a96ea686311b67b7e6e95f7af2df9c0b25186ab4d0a5ba82abf205 00050735 1 1/5 2017-12-02 21:55:22 08:155:02:29:51
key image 01: 95000032fb4cfe69422b3c414d4887310d0caf385e340bbf4cf0e17c5e99cf46 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 99adf4742eed350b88d5e4a6f83bbf2775e66708d287c9f8681950306002080f 00050735 1 1/6 2017-12-02 21:55:22 08:155:02:29:51
key image 02: 534f5321d5257c06de8cb7b9071d60a415fe95414615f2fcb515948b668fffeb amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 582e23eedc2b7b64a258557697df5d2410f0bbb783478dc4ebd85a145aa8a44c 00050735 1 3/3 2017-12-02 21:55:22 08:155:02:29:51
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 9, "key_offsets": [ 63413 ], "k_image": "2f761eb555f0b72c3063c08439c054bdd3a20d3b5e2039d488433411b83b435e" } }, { "key": { "amount": 400, "key_offsets": [ 276564 ], "k_image": "95000032fb4cfe69422b3c414d4887310d0caf385e340bbf4cf0e17c5e99cf46" } }, { "key": { "amount": 200, "key_offsets": [ 605149 ], "k_image": "534f5321d5257c06de8cb7b9071d60a415fe95414615f2fcb515948b668fffeb" } } ], "vout": [ { "amount": 8, "target": { "key": "ea50a22b4153f99022978e102af93fd1a9c6d0e07956f622c42436b922aa992a" } }, { "amount": 600, "target": { "key": "02ed8ba4a25aa686cc4976b1b874f82ee5029b70176f0dd55268e82192cfc9ac" } } ], "extra": [ 1, 170, 114, 154, 194, 1, 77, 47, 35, 232, 39, 228, 53, 125, 203, 75, 237, 86, 227, 95, 116, 233, 235, 43, 39, 130, 196, 191, 125, 152, 244, 123, 24 ], "signatures": [ "6433e17427fc4192ec62b6dcdb8ef08f407816eaea2ad8ca5de80df33707f5048d5c1ca452566ce2f848db8f3d703b09bf78465e9a0d096d112e2cd73612e300", "f77e01a40fa49ba989b1e3d85d6c2fad1c0b2f878b4dfba51819477d0523a5078038696bb168255f7e7b8c64bedcb895927ae7c8c652de32c8bdef157cc4cc02", "28944f6425a00426d42fb196cde7b2831c371c67201be9514c207cee1b7271098823d03b6f855f3a742b91609396fba30bb48909332fd2004f7efdee08ac2f0b"] }


Less details