Tx hash: b51b7221286301d395a83143d860eb6da10913513c38aaad42d1fe2bc905a6cf

Tx prefix hash: a0509589a872d9abbc5a8f80399d4440eb6d02245d2fe8695abdccea51238ae9
Tx public key: 31dc80f6808bb0caeccdaff5ab8264d08452fc9ab70153df34f56fce2f9f7cda
Timestamp: 1527528946 Timestamp [UCT]: 2018-05-28 17:35:46 Age [y:d:h:m:s]: 07:342:15:41:05
Block: 305309 Fee: 0.000001 Tx size: 0.4072 kB
Tx version: 1 No of confirmations: 3684464 RingCT/type: no
Extra: 0131dc80f6808bb0caeccdaff5ab8264d08452fc9ab70153df34f56fce2f9f7cda

2 output(s) for total of 0.00 ETNX

stealth address amount amount idx
00: 674cc5667c8bf4b5c2d95422db8c9de9932ad07f3857188546669c02f5a60a61 0.00 703957 of 714591
01: c7d87c411c82ac3c05350ef8f4b42b9ca971c70cec18466125425531c07a8eb0 0.00 1633645 of 1640330

Check which outputs belong to given Electronero address and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Electronero in this transaction

Tx private key can be obtained using get_tx_key command in electronero-wallet-cli command line tool
Note: address and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2018-05-21 05:18:33 till 2018-05-24 21:25:20; resolution: 0.021596 days)

  • |_______________________________________________________________________*__________________________________________________________________________________________________|
  • |__*_______________________________________________________________________________________________________________________________________________________________________|
  • |________________________________________________________________________________________________________________________________________________________________________*_|

3 inputs(s) for total of 0.00 etn

key image 00: 4abb2f970d38e9f838543e58a336666662da6470f8f33d3e60385ae5f2408eec amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 6dfb86b151f788f347cb5afadf3eedd9f26dbfeccc7f931e25675eaa5ee41979 00296709 1 8/158 2018-05-22 18:18:20 07:348:14:58:31
key image 01: 999821dd9878be438611442c5e28ccba179a6193cc06f62317624c58ffa90421 amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 09e515578f6ff8cb505e03b0d67677cbe1bfb39039dd277605ea705d10f0e1f0 00294538 5 6/6 2018-05-21 06:18:33 07:350:02:58:18
key image 02: 050e098ac0edfe5553000ad6567b8d51076421acb3cb439108ba931cedf0fb8f amount: 0.00
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: baf9c3afe3361e6e517d650b7008b034ff113c138892b373beb7b092f4ea4192 00299706 1 6/127 2018-05-24 20:25:20 07:346:12:51:31
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 1000, "key_offsets": [ 6746774 ], "k_image": "4abb2f970d38e9f838543e58a336666662da6470f8f33d3e60385ae5f2408eec" } }, { "key": { "amount": 7, "key_offsets": [ 840424 ], "k_image": "999821dd9878be438611442c5e28ccba179a6193cc06f62317624c58ffa90421" } }, { "key": { "amount": 1000, "key_offsets": [ 6912659 ], "k_image": "050e098ac0edfe5553000ad6567b8d51076421acb3cb439108ba931cedf0fb8f" } } ], "vout": [ { "amount": 6, "target": { "key": "674cc5667c8bf4b5c2d95422db8c9de9932ad07f3857188546669c02f5a60a61" } }, { "amount": 2000, "target": { "key": "c7d87c411c82ac3c05350ef8f4b42b9ca971c70cec18466125425531c07a8eb0" } } ], "extra": [ 1, 49, 220, 128, 246, 128, 139, 176, 202, 236, 205, 175, 245, 171, 130, 100, 208, 132, 82, 252, 154, 183, 1, 83, 223, 52, 245, 111, 206, 47, 159, 124, 218 ], "signatures": [ "002aa79055a1ed30840c24ef457755f6aebd30a3f7b2f06e6ecfa42d6e2da60f713459866342bb26ed014eb4a3b987818978b1ea62f35eb678138d29e8960e09", "13405fa94abb052846cd03fa1f95a046eb0cf6fe145b169326ba0daf28c3e40f5d42540de789aa0df0cc2d869fb83340ccf311dcb6556c8a76ba9a5807fb0006", "b022387fb5b836aeaf6210b2eeb2c3191f977a70cdaf8539e3f77c4cf9a8440640bc818919cabb3d3bb8d363efa36a52ab5108c7b9ed0a072e4d6b6078f42007"] }


Less details